Please turn on your JavaScript for this page to function normally.
Week in review: First-ever UEFI rootkit, Apple DEP vulnerability, new tactics subvert traditional security measures

Here’s an overview of some of last week’s most interesting news and articles: What do you mean by storage encryption? Depending on the threat context and how you …

phishing
Week in review: Shifting security priorities, phishing manipulation tactics, new issue of (IN)SECURE

Here’s an overview of some of last week’s most interesting news and articles: Why identity verification needs to be a part of your digital transformation strategy …

woman
Week in review: API security, malware-less email attacks, reversing the cybersecurity skills shortage

Here’s an overview of some of last week’s most interesting news and articles: What can we do to reverse the cybersecurity skills shortage? Having a strong pipeline …

arrow
Week in review: BA breach, Magento sites under attack

Here’s an overview of some of last week’s most interesting news and articles: How metrics can enhance the effectiveness of security programs Choosing the right …

abstract
Week in review: Blocking compromised passwords, removing personal data from connected cars

Here’s an overview of some of last week’s most interesting news and articles: 0patch releases micropatch for Windows Task Scheduler zero-day Acros Security, the …

red
Week in review: DNS interception, critical Apache Struts flaw, cybersecurity career pathing

Here’s an overview of some of last week’s most interesting news and articles: The importance of career pathing in the cybersecurity industry A major issue facing …

abstract
Week in review: Office 365 phishing, compromising networks with malicious faxes

Here’s an overview of some of last week’s most interesting news and articles: AT&T sued for enabling SIM swap fraud A cryptocurrency investor is suing …

arrows
Week in review: IoT security, cyber hygiene, Social Mapper

Here’s an overview of some of last week’s most interesting news and articles: Intensifying DDoS attacks: ​Choosing your defensive strategy One of the biggest …

gears
Week in review: Deploying automation securely, dark web activities that indicate a breach

Here’s an overview of some of last week’s most interesting news and articles: Industrial cybersecurity: Protecting OT from IT A powerful technique for protecting …

SF
Week in review: Bluetooth flaw, ERP applications under attack, advancing security with machine learning

Here’s an overview of some of last week’s most interesting news and articles: SCADA vulnerabilities in ICS architectures A major challenge in industrial control …

general virtual digital
Week in review: Zero-login, Magecart threat, cybersecurity expert shortage

Here’s an overview of some of last week’s most interesting news and articles: Dealing with a system launch: It requires more than just testing Rolling out new IT …

technology
Week in review: The OT/ICS landscape for cyber professionals, putting the Sec into DevSecOps

Here’s an overview of some of last week’s most interesting news: How to allocate budget for a well-rounded cybersecurity portfolio What should a well-rounded …

Don't miss

Cybersecurity news