Please turn on your JavaScript for this page to function normally.
Government IT pros overconfident in insider threat detection

An extensive study conducted by Dimensional Research evaluated the confidence of IT professionals regarding the efficacy of seven key security controls, which must be in place …

windows10 anniversary update
Windows 10 Anniversary Update brings security improvements

Microsoft has scheduled the release of Windows 10 Anniversary Update for August 2. Aside from new and/or improved tools to aid with productivity, gaming, device set-up, and a …

Google Chrome
Bug in Chrome’s PDF reader allows arbitrary code execution

Vulnerabilities in software often arise from faulty implementations of elements developed by other code writers. Take for example CVE-2016-1681, the heap-based buffer overflow …

Symantec
Bug in Symantec’s anti-virus engine can lead to system compromise

Google Project Zero researcher Tavis Ormandy has unearthed a critical remote code execution vulnerability in the anti-virus engine powering Symantec’s endpoint security …

Duo Security report
How secure are the devices connecting to enterprise assets?

Most enterprises have accepted that its employees will use their own various, often mobile devices to access company assets, and have realized that the defined, more easily …

vault
Ransomware attacks escalate, companies largely unprepared

Ransomware attacks against endpoints have recently taken place against hospitals in the US and Germany. Attacks have increased in severity to the point that the FBI issued an …

subgraph os
Subgraph OS: Open source, hardened OS that prioritizes security and anonymity

Subgraph, an open source security company based in Montreal, has published the alpha release of Subgraph OS, which is designed to with security, anonymity AND usability in …

linux tux
Linux security isn’t enough to stop data breaches

There is a difference between the security of an operating system and the security of the data created, which is edited and manipulated by people and saved on the operating …

fire
McAfee uses web beacons that can be used to track and serve advertising to users

A test of seven OEM laptops running Windows has shown consistent privacy and security issues, including an interesting revelation that the McAfee Antivirus running on six of …

keyboard
Insight into critical data remains limited

SANS surveyed 829 IT professionals with endpoints located around the globe to explore how IT professionals monitor, assess, protect and investigate their endpoints. A majority …

Dell SecureWorks speeds up endpoint intrusion detection, response

Dell SecureWorks is launching Advanced Endpoint Threat Detection (AETD) Red Cloak, a fully-managed SaaS solution that can slash the time required to detect and respond to …

abstract
Critical gaps in IT departments’ approach to enterprise security

A new study by conducted by Ultimate Windows Security, released at RSA Conference, provides visibility into the uses, concerns and challenges that IT departments face in …

Don't miss

Cybersecurity news