Please turn on your JavaScript for this page to function normally.
Infosec products of the month: May 2022

Here’s a look at the most interesting products from the past month, featuring releases from: AuditBoard, BIO-key, Cohesity, Corelight, Data Theorem, Deepfence, ForgeRock, …

Microsoft support
Zero-day bug exploited by attackers via macro-less Office documents (CVE-2022-30190)

A newly numbered Windows zero-day vulnerability (CVE-2022-30190) is being exploited in the wild via specially crafted Office documents (without macros), security researchers …

zero
Zero-trust-washing: Why zero trust architecture is the framework to follow

Have we got to the point where the term “zero trust” is being misused or misrepresented by some vendors as they look to capitalize on its momentum in the market? It is a …

criminal
57% of all digital crimes in 2021 were scams

Group-IB shares its analysis of the landscape of the most widespread cyber threat in the world: scams. Accounting for 57% of all financially motivated cybercrime, the scam …

handshake
How effective are public-private partnerships?

Ninety-three percent of cyber decision-makers say public-private partnerships are vital to national defense, but only 34 percent believe they are very effective, according to …

digital transformation
There is no good digital transformation without cybersecurity

Network engineers and CIOs agree that cybersecurity issues represent the biggest risk for organizations that fail to put networks at the heart of digital transformation plans. …

endpoint protection
HP Wolf Security: A new breed of endpoint protection

Millions of employees are now working from home or in a hybrid setting. Unfortunately for cybersecurity, hackers aren’t confined to office walls. It’s time for your security …

iPhone
$39.5 billion lost to phone scams in last year

Truecaller announced a research conducted in partnership with The Harris Poll in March of 2022, and the findings detail trends/insights on the impact of spam and phone scams …

compliance
Moving toward a more adaptable and tech-driven compliance function

A growing global regulatory focus on consumer privacy and data protection, along with new sustainability measurement and reporting laws is furthering the importance of …

week in review
Week in review: Account pre-hijacking, Sigstore, ransomware still winning

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: RansomHouse: Bug bounty hunters gone rogue? A new cybercrime outfit that …

New infosec products of the week: May 27, 2022

Here’s a look at the most interesting products from the past week, featuring releases from Corelight, Fortinet, Hunters, Kingston Digital, Netenrich, PIXM, and SafeGuard …

How to eliminate the weak link in public cloud-based multi-party computation

Secure multi-party computation (MPC) has seen steady evolution to tackle many scientific challenges. These include enabling the creation and tuning of AI or machine learning …

Don't miss

Cybersecurity news