cybersecurity
Women helping women: Encouraging inclusivity in the cybersecurity industry
Since 1987, the month of March has been known as Women’s History Month, celebrating the historical achievements and contributions of women around the world. It is especially …
DDoS attacks surge as cybercriminals take advantage of the pandemic
DDoS attacks reached a record high during the pandemic as cybercriminals launched new and increasingly complex attacks, a Link11 report reveals. The analysis showed a boom in …
Years-old MS Office, Word flaws most exploited to deliver malware
29% of malware captured was previously unknown – due to the widespread use of packers and obfuscation techniques by attackers seeking to evade detection, according to a HP …
Consumers aware of security concerns, but not doing much to change password habits
The recent remote work trend caused by the pandemic has increased password security risks of both companies and individuals. Despite this fact, Americans continue to put …
The influence of the Agile Manifesto, 20 years on
On 11th February 2001, many software delivery thought leaders came together in Snowbird, Utah, to discuss how to create processes that can enable enterprises to continuously …
The dangers of misusing instant messaging and business collaboration tools
71% of office workers globally – including 68% in the US – admitted to sharing sensitive and business-critical company data using instant messaging (IM) and business …
Threat actors thriving on the fear and uncertainty of remote workforces
The pandemic’s work-from-home reality resulted in an unprecedented change for organizations as they fought to defend exponentially greater attack surfaces from cybercriminals …
Risk management in the digital world: How different is it?
Managing risk arising from remote work has largely been reactive, and risk managers have had to adapt to new digital threats that weren’t necessarily as prevalent when work …
If you are not finding vulnerabilities, then you are not looking hard enough
Building security and privacy into products from concept to retirement is not only a strong development practice but also important to enable customers to understand their …
Security threats increasing with 70% using personal devices for work
Samsung has revealed the results of a multi-industry research study, which identifies the main technology challenges UK businesses have faced over the last year – and the key …
Why data privacy will be the catalyst for digital identity adoption
Most of us probably don’t think of buying a bottle of wine as a security risk. However, we inadvertently give away our address, surname, nationality and signature – …
Alarming number of consumers impacted by identity theft, application fraud and account takeover
A new report, developed by Aite Group, and underwritten by GIACT, uncovers the striking pervasiveness of identity theft perpetrated against U.S. consumers and tracks shifts in …
Featured news
Resources
Don't miss
- Balancing usability and security in the fight against identity-based attacks
- MSSqlPwner: Open-source tool for pentesting MSSQL servers
- Critical SimpleHelp vulnerabilities fixed, update your server instances!
- Configuration files for 15,000 Fortinet firewalls leaked. Are yours among them?
- New UEFI Secure Boot bypass vulnerability discovered (CVE-2024-7344)