Please turn on your JavaScript for this page to function normally.
Patch Tuesday
Microsoft patches actively exploited zero-day (CVE-2021-36948), more Print Spooler flaws

Microsoft’s August 2021 Patch Tuesday is pretty lightweight, through it covers a wide variety of Microsoft solutions. 44 CVE-numbered security holes have been plugged, …

Magento
Adobe fixes security holes in Magento, most of which are critical

Adobe has released security updates to address vulnerabilities in Magento and Adobe Connect. Magento August 2021 security updates Magento is a popular open-source e-commerce …

healthcare
The challenges healthcare CISOs face in an evolving threat landscape

Organizations in the healthcare sector – and especially those engaged in delivering healthcare services – have always been juicy targets for cyber attackers. But …

XDR
Can XDR bring the kill chain back to its roots?

When Lockheed Martin engineers first came up with the cyber kill chain concept, the purpose was clear – to mitigate or eliminate a cyberattack. It borrowed from military …

biometrics
The evolution of identity-first security

Earlier this year, Gartner named identity-first security as one of the top security and risk management trends for 2021. Companies have been moving away from traditional LAN …

Flavio Aggio
World Health Organization CISO suggests a holistic approach to cybersecurity

Flavio Aggio, CISO at the World Health Organization, has had a challenging year. Since the onset of the COVID-19 pandemic, the WHO has become a significant target for …

ransomware
SMBs increasingly vulnerable to ransomware, despite the perception they are too small to target

Acronis released a report which gives an in-depth review of the cyberthreat trends the company’s experts are tracking. The report warns that small and medium-sized …

shark
Cyber intrusion activity volume jumped 125% in H1 2021

The volume of cyber intrusion activity globally jumped 125% in the first half of 2021 compared with the same period last year, according to the Cyber Investigations, Forensics …

shield
Enterprises turning to cybersecurity providers to fight off cyberattacks

Enterprises in the U.S. are turning to cybersecurity providers offering best-of-breed technologies that can help them fend off cyberattacks from sophisticated criminals, …

lock
The value of PII and how it still fuels malign activities in the digital ecosystem

The COVID-19 pandemic engendered new vulnerabilities in the digital ecosystem for threat actors to exploit, resulting in items like vaccines, fraudulent vaccine certificates, …

network
Security matters when the network is the internet

In the past, network security was too often viewed as a separate issue to the design of the network itself, which led to solutions being either poorly thought out or hastily …

industrial
Why ransomware is such a threat to critical infrastructure

A recent spike in large-scale ransomware attacks has highlighted the vulnerabilities in the nation’s critical infrastructure and the ease with which their systems can be …

Don't miss

Cybersecurity news