vulnerability

Siloed security data hamper the ability to achieve collective defense
Cyware revealed a research detailing the challenges affecting modern security operations teams and the negative business impact of siloed security operations. According to the …

Organizations losing business due to connected product security concerns
59% of executives with cybersecurity decision-making responsibility at large and mid-sized companies say that their organizations have lost business due to product security …

Storage systems vulnerabilities: Act now to avoid disasters
Continuity issued a research report which provided an analysis of the vulnerabilities and misconfigurations of enterprise storage systems. The findings revealed that storage …

Worldwide supply chains vulnerable as businesses lack visibility into suppliers
BlueVoyant released the findings of its second annual global survey into third-party cyber risk management. The study reveals that 97% of firms surveyed have been negatively …

Apache OpenOffice users should upgrade to newest security release!
The Apache Software Foundation (ASF) has released Apache OpenOffice 4.1.11, which fixes a handful of security vulnerabilities, including CVE-2021-33035, a recently revealed …

AWS ransomware attacks: Not a question of if, but when
Ermetic announced the results of a study about the security posture of AWS environments and their vulnerability to ransomware attacks. In virtually all of the participating …

Remote work exposing SMEs to increased cybersecurity risk
Remote working is leading to increased cybersecurity risks for SMEs, a research from ServerChoice shows. The research, conducted with 1,000 business leaders at SMEs, found …

Patch management complexity increased by remote work is putting organizations at risk
71% of IT and security professionals found patching to be overly complex, cumbersome, and time consuming, an Ivanti survey reveals. In fact, 57% of respondents stated that …

Critical infrastructure IoT security: Going back to basics
In this interview with Help Net Security, James Carder, CSO & VP of Labs at LogRhythm, talks about critical infrastructure IoT security, the vulnerabilities that are …

Combating vulnerability fatigue with automated security validation
Security operations teams have been dealing with “alert fatigue” for far too long. The introduction of log monitoring (e.g., SIEM), firewall, and AV technologies over two …

Leveraging threat intelligence to tackle supply chain vulnerabilities
In this interview with Help Net Security, Brandon Hoffman, CISO at Intel 471, talks about the growing threat of supply chain attacks, the most common supply chain …

Corporate attack surface exploding as a result of remote work
74% of organizations attribute recent business-impacting cyberattacks to vulnerabilities in technology put in place during the pandemic. The data is drawn from a study of more …