Please turn on your JavaScript for this page to function normally.
question
Software vulnerabilities sometimes first announced on social media

Software vulnerabilities are more likely to be discussed on social media before they’re revealed on a government reporting site, a practice that could pose a national …

CAM4
Adult live streaming site CAM4 found leaking data of millions of users

A misconfigured database containing 7 terabytes of sensitive user and company information related to adult live streaming site CAM4 has been found leaking data. The database …

WordPress
Nearly a million WordPress sites targeted in extensive attacks

A threat actor is actively trying to insert a backdoor into and compromise WordPress-based sites to redirect visitors to malvertising. “While our records show that this …

healthcare
Helping healthcare combat cyber attackers

Hospitals and other healthcare organizations around the globe are under immense pressure as they test and care for patients with COVID-19. They are also under siege by cyber …

remote work
Future of work: Delivering a modern workspace

We are all painfully aware how the current climate of lockdown and working from home has focused the conversations within the technology community regarding the pros and cons …

password
Password psychology: People aren’t protecting themselves even though they know better

People aren’t protecting themselves from cybersecurity risks even though they know they should, a study on password psychology by LogMeIn reveals. Password psychology Year …

patch
Sensitive data is piling up on enterprise devices, Windows 10 machines behind on patching

Directly after the WHO declared COVID-19 a global pandemic, an estimated 16 million US employees were sent home and instructed to work remotely, while governments around the …

encryption
How to prevent permission bloat: Overlooked and hidden access

When it comes to your organizational security, you should leave no stone unturned. Overlooked access rights are one of the most unnoticed security threats your organization …

glasses
Why you should be rushing to deploy multi-factor authentication to support remote work

With a third of the population currently working remotely and great uncertainty regarding when this situation is going to change, organizations must shift their business …

Magnify
Half of IT pros believe their cybersecurity teams are ready to detect attacks

A surprising 51 percent of technology professionals and leaders are highly confident that their cybersecurity teams are ready to detect and respond to rising cybersecurity …

password
Help your helpdesk: Empower employees to self-reset their AD account password

The COVID-19 pandemic has triggered a momentous shift for many organizations: remote work has become the new normal. Businesses that were skeptical before are now being forced …

cloud
Protecting corporate data in popular cloud-based collaborative apps

Cloud adoption has grown at an astonishing rate, providing organizations with the freedom to store data in numerous cloud applications that meet their specific business …

Don't miss

Cybersecurity news