Please turn on your JavaScript for this page to function normally.
Office 365 security: Automated incident response based on playbooks

Five months after introducing Automated Incident Response in Office 365 ATP, Microsoft has announced it’s making it more widely available. Customers who have opted for …

lights
Business demands have outpaced the ability of IT to deliver services

While enterprises have embraced advanced digital technologies, such as IoT/edge computing (77 percent), big data/analytics (83 percent) and digital customer experience (78 …

stop
Should you block newly registered domains? Researchers say yes

7 out of 10 newly registered domains (NRDs) are either malicious, suspicious or not safe for work, say Palo Alto Networks researchers, and advise organizations to block access …

Symantec
Symantec sells its name and enterprise security business to Broadcom

Symantec announced it has entered into a definitive agreement to sell its Enterprise Security assets, which include the Symantec name, to semiconductor giant Broadcom, for …

Warshipping: Attackers can access corporate networks through the mailroom

Most infosecurity professionals have heard of wardialing and wardriving, but what about warshipping? The expression has been coined by IBM X-Force Red researchers to describe …

shield
Organizations are employing cyber-resilient strategies in new ways

Wipro released its 2019 State of Cybersecurity Report, which highlights the rising importance of cybersecurity defense to global leaders, the emergence of the CISO as a …

G Suite
G Suite news: Anomalous alert activity for Google Drive, Advanced Protection for enterprise users

Google is rolling out new security options for G Suite users and admins, aimed at alerting organizations about data exfiltration attempts on Google Drive and helping them …

CapitalOne
Capital One breach: Info on 106 million customers compromised, hacker arrested

Capital One, one of the largest banks in the United States by assets, has announced that it has suffered a massive data breach affecting the personal and financial information …

danger
200 million enterprise, industrial, and medical devices affected by RCE flaws in VxWorks RTOS

Armis researchers have discovered 11 vulnerabilities (including 6 critical RCE flaws) in Wind River VxWorks, a real-time operating system used by more than two billion devices …

Cloud adoption and security are not mutually exclusive

As organizations continue to adopt cloud services to achieve their desired business objectives, many don’t realize that the thing that makes cloud computing great – …

user
How to improve the hiring and retaining of infosec professionals?

The cybersecurity staffing and skills shortage is a well-known reality and the situation is predicted to get worse in the coming years. There are many problems There are …

identity
True passwordless authentication is still quite a while away

The password has been one of the great inventions in the history of computing: a solution that allowed simple and effective identity and access management when the need arose …

Don't miss

Cybersecurity news