Please turn on your JavaScript for this page to function normally.
hardware
Most third-party libraries are never updated after being included in a codebase

79% percent of the time, third-party libraries are never updated by developers after being included in a codebase – despite the fact that more than two thirds of fixes …

remote workforce protection
What is the impact of remote work on security best practices?

Employees are now accessing resources from any device and from anywhere outside of their corporate domain, a JumpCloud survey reveals. The report details the impact of …

Broken glass
Defense supply chain vulnerabilities creating security gaps

A BlueVoyant report highlights critical vulnerabilities within the defense supply chain ecosystem. The report includes evidence of the exploitable cyber weaknesses of SMBs …

mobile security
76% of IT decision makers more vulnerable to mobile attacks than just a year ago

53 percent of IT decision makers admitted that it’s not possible to be prepared for all the tactics and strategies used by attackers targeting mobile devices, a survey by …

cloud
Can on-prem security experts make the move to the cloud?

As cloud computing grows in popularity across all use cases, cloud workloads have never been more attractive to malicious actors. A recent McAfee report points to a 630 …

tools
Software delivery maturity generating business benefits

Organizations with a high level of software delivery maturity are three times more likely to grow at 15 percent or more annually, according to Forrester Consulting. …

cloud
Understanding the cloud shared responsibility model

Over the past year, we witnessed a transition to the cloud as companies had to quickly adjust to the almost instantaneous move to a remote work environment. But in many cases, …

remote workforce protection
Corporate attack surfaces growing concurrently with a dispersed workforce

Zscaler released a report on the state of corporate attack surfaces. Based on data sourced between February 2020 and April 2021, the report provides a first-ever look at the …

glasses
Effects of the pandemic on consumer security behaviors

IBM announced the results of a global survey examining consumers’ digital behaviors during the pandemic, as well as their potential long-term impact on cybersecurity. …

Hand
Why XSS is still an XXL issue in 2021

Cross-site scripting (XSS) attacks take advantage of coding flaws in the way websites or web applications generate input from users. Despite their longstanding reputation as a …

attacks
VPN attacks up nearly 2000% as companies embrace a hybrid workplace

Nuspire released a report which outlines new cybercriminal activity and tactics, techniques and procedures (TTPs) with additional insight from Recorded Future. “As companies …

How a conference room speakerphone might let attackers into your company network

Several egregious vulnerabilities affecting the Stem Audio Table conference room speakerphone could be exploited by attackers to eavesdrop on what’s being discussed in …

Don't miss

Cybersecurity news