Please turn on your JavaScript for this page to function normally.
Apache Solr
Apache Solr RCEs with public PoCs could soon be exploited

Two remote code execution (RCE) vulnerabilities in Apache Solr could be exploited by attackers to compromise the underlying server. One – CVE-2019-12409 – has …

5G
Redefining security KPIs for 5G service providers

Telco security professionals are missing the mark when understanding their consumers’ priorities, according to KPMG’s recent report. In the wake of a security breach, …

World
Enterprise cybersecurity in the Asia-Pacific region

Almost one in five business organizations in the Asia-Pacific (APAC) region experienced more than six security breaches in the past two years, a new ESET enterprise …

building
Enterprise expectations of managed service providers and public cloud providers are shifting

Enterprise expectations of managed service providers (SPs), along with their ecosystem of public cloud provider partners, are shifting and will drive fundamental changes in …

Microsoft logo
New, improved Microsoft 365 security and compliance features

Microsoft has announced a number of enhancements to help its business and enterprises customers improve security and compliance efforts. Among these is a new solution for …

road
Key predictions that will impact CIOs and IT pros over the next five years

Time for action is growing short for CIOs in the digital era. Many continue to struggle with siloed digital transformation initiatives, leaving them adrift and buffeted by …

money
Security services and network security still top spending priorities for CISOs in MENA

Middle East and North Africa (MENA) enterprise information security and risk management spending will total $1.7 billion in 2020, an increase of 10.7% from 2019, according to …

Office 365
Office 365 users targeted with fake voicemail alerts in suspected whaling campaign

Office 365 users at high-profile companies in a wide variety of industries are being targeted with voicemail-themed phishing emails, McAfee researchers have found. They say …

Microsoft Windows
Most IT pros still haven’t migrated all their users to Windows 10

59% of IT professionals report that they still haven’t migrated all their users to Windows 10, despite the imminent end of regular support for Windows 7 on January 14, 2020, …

G Suite
G Suite admins get context-aware access controls, rule-based automated actions and alerts

Google is rolling out new security capabilities for G Suite Enterprise administrators, allowing them to implement context-aware access controls for users and to create rules …

shark
Is the enterprise on the brink of a global web supply chain attack?

Ever since the Web development ecosystem evolved to the current paradigm of code reuse, companies have placed themselves too close to the abyss. Web supply chain attacks are a …

search
Investigations are an unfortunate fact of life for most corporations

Corporate investigations, which can be triggered by any number of events, have become a fact of life for most companies, according to a survey from H5. The survey focused on …

Don't miss

Cybersecurity news