Please turn on your JavaScript for this page to function normally.
laptop
Cybercriminals thriving on companies overlooking fundamental security requirements

IT leaders in the United States are putting business data at risk by not effectively managing employees’ passwords, according to OneLogin research. Despite the fact that 91% …

gap
60% of businesses have experienced a serious security breach in the last two years

There is an increase in security breaches and businesses still face challenges surrounding cyberattacks due to lack of IT security and operations basics. With digital …

SAP
50,000 companies running SAP installations open to attack via publicly released exploits

Two exploits publicly released in late April at the OPCDE security conference in Dubai could be leveraged to compromise a great number of SAP implementations, Onapsis has …

open source
Open source security: The risk issue is unpatched software, not open source use

Many of the trends in open source use that have presented risk management challenges to organizations in previous years persist today. However, new data also suggest that an …

building
Supply chain attacks: Mitigation and protection

In software development, a supply chain attack is typically performed by inserting malicious code into a code dependency or third-party service integration. Unlike typical …

location services
Researchers develop cybersecurity system to test for vulnerabilities in technologies that use GPS

Southwest Research Institute has developed a cybersecurity system to test for vulnerabilities in automated vehicles and other technologies that use GPS receivers for …

cloud
As organizations continue to adopt multicloud strategies, security remains an issue

97 percent of organizations are adopting multicloud strategies for mission-critical applications and nearly two-thirds are using multiple vendors for mission-critical …

cloud binary
Security and compliance obstacles among the top challenges for cloud native adoption

Cloud native adoption has become an important trend among organizations as they move to embrace and employ a combination of cloud, containers, orchestration, and microservices …

alert
Making the most of threat intelligence with threat intelligence gateways

Even though many security professionals are still dissatisfied with threat intelligence accuracy and quality, its use as a resource for network defense is growing. According …

medical
Hacking our way into cybersecurity for medical devices

Hospitals are filled with machines connected to the internet. With a combination of both wired and wireless connectivity, knowing and managing which devices are connected has …

firefighters
SEC demands better disclosure for cybersecurity incidents and threats

As companies increasingly rely on networked systems and on the Internet, cybersecurity threats have grown. Companies that fall victim to a successful cyberattack incur …

dislike
Most adults are concerned about malware and phishing on social media

More than eighty percent of adults believe that they’re at risk when it comes to security on social media. Most American adults are using at least one social media …

Don't miss

Cybersecurity news