cybersecurity
Oil and gas industry risks escalate, cybersecurity should be prioritized
The oil and gas industry and its supply chain face increased cybersecurity risks from advanced threat groups and others as they continue to build out digitally connected …
The importance of proactive patch management
IT teams appreciate it when vendors or security researchers discover new vulnerabilities and develop patches for them. So do attackers. The same information that lets IT teams …
Will quantum computing overwhelm existing security tech in the near future?
More than half (54%) of cybersecurity professionals have expressed concerns that quantum computing will outpace the development of other security tech, according to a research …
SaaS security fears: Is your data exposed to potential risk?
IT executives have rising SaaS security fears, and worry about cloud security, proprietary data encryption, as well as the loss of independent control due to access …
2020 is prime for a global building cybersecurity standard
Buildings will account for 81% of all connected things in 2020, ushering in a new era of smart office buildings, schools, hospitals and more that will improve efficiencies for …
Active Directory password reset best practices
Password change and password reset are terms that are often used interchangeably. However, they are not the same. A user will perform a password change when they remember …
Consumers not willing to compromise when it comes to IoT security
Nearly three quarters of consumers expect manufacturers of connected IoT devices to protect their devices from hacks, according to Karamba Security. Consumers take IoT …
How identity is addressed by enterprise IT security teams
The majority of companies have experienced a five-fold increase in the number of workforce identities, which are being driven primarily by mobile and cloud technology. …
How to test employee cyber competence through pentesting
Social engineering hacking preys on the vulnerabilities inherent in human psychology. Take the Nigerian (419) scams as an example: the scammer tries to convince the victim to …
78% of people forgot a password in the past 90 days
Passwords are the dominant way online services manage access to our personal and work-related lives. But often times, they’re more of a headache than a security tool. HYPR …
Enterprises reaching a security tool tipping point
A rapid increase in the number of security tools used by large companies is limiting their return on investment while increasing the risk of cyber threats, according to …
How enterprise risk management programs operate in organizations today
More than half of CEOs think their enterprise risk management program (ERM) program is not as effective as it should be, a LogicGate survey reveals. Challenges for enterprise …
Featured news
Resources
Don't miss
- Balancing usability and security in the fight against identity-based attacks
- MSSqlPwner: Open-source tool for pentesting MSSQL servers
- Critical SimpleHelp vulnerabilities fixed, update your server instances!
- Configuration files for 15,000 Fortinet firewalls leaked. Are yours among them?
- New UEFI Secure Boot bypass vulnerability discovered (CVE-2024-7344)