cybersecurity
GDPR, CCPA and beyond: How synthetic data can reduce the scope of stringent regulations
As many organizations are still discovering, compliance is complicated. Stringent regulations, like the GDPR and the CCPA, require multiple steps from numerous departments …
Shift to work-from-home: Most IT pros worried about cloud security
As most companies make the rapid shift to work-from-home to stem the spread of COVID-19, a significant percentage of IT and cloud professionals are concerned about maintaining …
A worrisome increase in call traffic from fraudsters exploiting the pandemic
There’s a worrisome increase in call traffic from bad actors looking to cash in on new vulnerabilities created by the global COVID-19 pandemic, according to research …
When your laptop is your workspace, the real office never closes
With the COVID-19 pandemic, working from home has moved from a company perk to a hard requirement. Social distancing government mandates have forced complete office closures …
Small businesses unprepared for remote working, most don’t provide cybersecurity training
Stay-at-home orders for more than 40 states have forced millions of businesses to establish remote workforces that rely solely on internet-enabled applications and products to …
You have to consider cybersecurity at all points of a cloud migration
Human error and complex cloud deployments open the door to a wide range of cyber threats, according to Trend Micro. Cloud security issues Gartner predicts that by 2021, over …
10 considerations in order to ensure business continuity for PKI
Every year, enterprises face unforeseen events that can disrupt operations. These events are rarely predictable and often create significant challenges for IT and security …
Enterprises regard the cloud as critical for innovation, but struggle with security
Most enterprises (85%) believe embracing the public cloud is critical to fuel innovation, but the majority are not equipped to operate in the cloud securely, according to a …
Know thy enemy: The evolving behaviors of today’s cybercriminals
Organizations in the energy/utilities, government, manufacturing, and healthcare sectors have witnessed an increase in cyberattacks over the past year. In fact, recent …
What do CISOs want from cybersecurity vendors right now?
As COVID-19 spreads across the globe, what challenges are CISOs and other cybersecurity executives dealing with and what things they don’t want to be dealing with at the …
Third-party risk is broken, businesses unprepared for supply chain disruptions
Many companies are not dedicating proper resources to assess third-party risks, and those that are still lack confidence in their programs, according to Prevalent. Supply …
APT attacks targeting Linux, Windows and Android remained undetected for nearly a decade
Five related APT groups operating in the interest of the Chinese government have systematically targeted Linux servers, Windows systems and mobile devices running Android …
Featured news
Resources
Don't miss
- Balancing usability and security in the fight against identity-based attacks
- MSSqlPwner: Open-source tool for pentesting MSSQL servers
- Critical SimpleHelp vulnerabilities fixed, update your server instances!
- Configuration files for 15,000 Fortinet firewalls leaked. Are yours among them?
- New UEFI Secure Boot bypass vulnerability discovered (CVE-2024-7344)