Please turn on your JavaScript for this page to function normally.
person
How businesses use data might not be popular with the public

A KPMG survey reveals a deep disconnect between corporate data practices and the general population’s expectations around transparency and data privacy. As companies collect …

biohazard
Houdini malware returns, enterprise risk assessment compromised by Amazon Sidewalk

Cato Networks announced the results of its analysis of 263 billion enterprise network flows between April and June 2021. Researchers showed a novel use of Houdini malware to …

remote work
Remote working positively impacting employee experience

Globalization Partners announced the findings of its survey which focused on the sentiment of people working on global teams. 63 percent of respondents say their companies …

Fortinet
Unpatched Fortinet FortiWeb vulnerability allows remote OS command injection

An unpatched vulnerability in the management interface for FortiWeb, Fortinet’s web application firewall, could allow a remote, authenticated attacker to execute …

IoT
Critical bug allows remote compromise, control of millions of IoT devices (CVE-2021-28372)

A vulnerability (CVE-2021-28372) in the SDK that allows IoT devices to use ThroughTek’s Kalay P2P cloud platform could be exploited to remotely compromise and control …

T-Mobile
T-Mobile data breach: Industry reactions

T-Mobile is investigating a claim that as many as 100 million accounts may have been compromised in a data breach. In a cybersecurity update, T-Mobile said: “We have …

drown
How building a world class SOC can alleviate security team burnout 

For security leaders, building a mature Security Operations Center is about establishing robust processes that bring teams and technology together for success. Yet many SOC …

Melissa Sutherland
Where do we stand when it comes to multi-cloud maturity?

Most IT leaders agree their future-state IT landscape will be a multi-cloud environment. Figuring out how to achieve that will take some time. In this interview with Help Net …

ransomware
Most organizations experienced at least one ransomware attack, multiple attacks very common

One third of organizations worldwide have experienced a ransomware attack or breach that blocked access to systems or data in the previous 12 months. And for those that fell …

NAS
NAS devices under attack: How to keep them safe?

Network-attached storage (NAS) devices are a helpful solution for storing, managing, and sharing files and backups and, as such, they are an attractive target for cyber …

SASE
SASE market size to reach $11.29 billion by 2028

The global secure access service edge (SASE) market size is expected to reach $11.29 billion by 2028, registering a CAGR of 36.4%, a ResearchAndMarkets report reveals. The …

fraud detection
Digital fraud attempts on the rise: Gaming, travel and leisure most targeted

As the prevalence of digital fraud attempts on businesses and consumers continues to rise, TransUnion’s analysis found that fraudsters are re-focusing their efforts from …

Don't miss

Cybersecurity news