Please turn on your JavaScript for this page to function normally.
mobile security
Consumers neglecting mobile security despite growing number of threats

Over the past year, consumers have adapted to many changes, including the rapid shift towards a digital-first lifestyle. This has led to an emphasis on consumers dependence on …

syringe
Combatting OpSec threats to our COVID-19 vaccination efforts: What can we do?

COVID-19 vaccines have been rolling out for a few months now, but the nature of the pandemic and the number of people impacted by it mean that demand for these vaccines is …

tools
Software delivery maturity generating business benefits

Organizations with a high level of software delivery maturity are three times more likely to grow at 15 percent or more annually, according to Forrester Consulting. …

data
Data privacy management software market to grow steadily

The data privacy management software market saw soaring growth in 2020 with worldwide revenues up 46.1% year over year. IDC expects this growth to continue over the next …

iOS 15
Apple privacy protections in iOS 15, iPadOS 15, macOS Monterey, and watchOS 8

Apple previewed new privacy protections in iOS 15, iPadOS 15, macOS Monterey, and watchOS 8, which help users better control and manage access to their data. “Privacy has been …

CODESYS
Critical vulnerabilities identified in CODESYS ICS automation software

Researchers have identified 10 vulnerabilities in CODESYS automation software for industrial control systems. Some are of high and critical severity. “The vendor rated …

Kali Linux 2021.2
Kali Linux 2021.2 released: Kaboxer, Kali-Tweaks, new tools, and more!

Offensive Security has released Kali Linux 2021.2, the latest version of its popular open source penetration testing platform. You can download it or upgrade to it. Kali Linux …

Qualys CSAM
Helping security teams respond to gaps in security and compliance programs with Qualys CSAM

Unlike traditional inventory tools that focus solely on visibility or rely on third-party solutions to collect security data, Qualys CyberSecurity Asset Management (CSAM) is …

cloud
SeKVM: Securing virtual machines in the cloud

Whenever you buy something on Amazon, your customer data is automatically updated and stored on thousands of virtual machines in the cloud. For businesses like Amazon, …

account
Why cybersecurity products always defy traditional user reviews

I read with interest the latest batch of evaluation data from MITRE on various endpoint solutions, this time focusing on the detect, response and containment of these various …

Yor
Open-source tool Yor automatically tags IaC resources for traceability and auditability

Yor is an open-source tool from Palo Alto Networks that automatically tags cloud resources within infrastructure as code (IaC) frameworks such as Terraform, Cloudformation, …

code
A leadership guide for mitigating security risks with low code platforms

The low code market continues to grow, increasingly finding adoption for more diverse and serious applications among enterprises and independent software vendors (ISVs). The …

Don't miss

Cybersecurity news