Please turn on your JavaScript for this page to function normally.
Keyboard
Spring network cleaning: Quick tips to reduce risk

Spring is here, which means many people will be cleaning their workspace and getting rid of the clutter on their desks. If you’re in charge of your organization’s security, we …

world in hand
Week in review: The inconvenient truth about API security, and the perfect exfiltration technique

Here’s an overview of some of last week’s most interesting news and articles: Uninstall QuickTime for Windows today! Trend Micro’s Zero Day Initiative has released …

threat hunting
The rise of threat hunting

85 percent of enterprises have already adopted some form of threat hunting to aggressively track and eliminate cyber adversaries as early as possible. This proactive model …

data security
EU approves new data protection rules

Members of the European Parliament have given their final approval for the new General Data Protection Regulation (GDPR). Parliament’s vote ends more than four years of work …

Globe
3 steps to embracing NIST 800 security controls

One proven path to improving any organization’s security posture is to embrace the National Institute of Standards and Technology’s risk management framework set forth in its …

cloud binary
Trust is the key to cloud adoption

Intel Security released a global report advocating the need for technology vendors to help businesses, governments and consumers understand the implications surrounding …

Why few US consumers penalize hacked companies?

About a quarter of American adults reported that they were notified about their personal information being part of a data breach in the previous year, but only 11 percent of …

stairs
Why the smart office is highly susceptible to data breaches

The Edge in Amsterdam is one of the smartest office buildings in the world. The state-of-the-art offices include 28,000 connected sensors for motion, light, temperature, …

gears
Software tools and services used to achieve ISO 27001

With high profile breaches becoming almost a daily occurrence in the media, many organizations are now turning to the ISO 27001 information security standard to help them stay …

idea
Security tips and tricks for businesses and consumers

In 2015, the number of zero-day vulnerabilities discovered more than doubled to a record-breaking 54, a 125 percent increase from the year before, reaffirming the critical …

abstract lights
Public institutions targeted with shape changing Qbot malware

A new strain of Qbot, malicious software that steals user credentials and creates backdoors on targeted devices, has infected over 54,000 PCs in thousands of organisations …

servers
Why ICS network attacks pose unique security challenges

Attacks on industrial control systems (ICSs) are increasing in frequency – and have become a reality we can no longer ignore. Securing these networks poses unique …

Don't miss

Cybersecurity news