Please turn on your JavaScript for this page to function normally.
Apple
A new zero-day is being exploited to compromise Macs (CVE-2021-30869)

Another zero-day in Apple’s software (CVE-2021-30869) is being actively exploited by attackers, forcing the company to push out security updates for macOS Catalina and …

New infosec products of the week: September 24, 2021

Here’s a look at the most interesting product releases from the past week, featuring releases from CoSoSys, Druva, McAfee, Nutanix and Stairwell. CoSoSys Endpoint Protector …

risk
Implementing risk quantification into an existing GRC program

With a myriad of risks and limited security budgets, how do organizations decide which projects to prioritize? Many governance, risk management and compliance (GRC) …

light
The evolution of DRaaS

The shift of daily production workloads from on-premises to cloud has also impacted approaches to protection of business assets and operations. When it comes to protecting …

US president
Policy and patience key in Biden’s cybersecurity battle

Last month, President Biden hosted a group of technology and insurance executives to build support for a “whole-of-nation effort” to improve cybersecurity. The executive …

cloud
Most IT leaders prioritize cloud migration, yet security concerns remain

There has been a significant year-on-year leap in companies planning to move business-critical applications to the cloud, despite cybersecurity concerns, Equinix has found. …

organize
SaaS subscriptions bouncing back as enterprises seek innovation

Enterprises worldwide continue to migrate from proprietary, licensed software to software-as-a-service (SaaS) subscriptions as they seek innovation, better user experience and …

servers
Server market size to reach $145.31 billion by 2028

The global server market size is expected to reach $145.31 billion by 2028, according to ResearchAndMarkets. It is expected to expand at a CAGR of 7.8% from 2021 to 2028. The …

Nagios
Nagios XI vulnerabilities open enterprise IT infrastructure to attack

Researchers have unearthed 11 vulnerabilities affecting Nagios XI, a widely used enterprise IT infrastructure/network monitoring solution, some of which can be chained to …

U.S. Department of the Treasury
U.S. Department of the Treasury announces set of actions to counter ransomware

As part of the whole-of-government effort to counter ransomware, the U.S. Department of the Treasury announced a set of actions focused on disrupting criminal networks and …

IoT
Protecting IoT devices requires a DNS-based solution

IoT devices are fast becoming an everyday part of our lives. Whether it be in the role they play in manufacturing and industry or powering the appliances in our own homes, …

identity theft
Consumers taking action to protect themselves online, though confidence is low

68% of consumers claim to be doing more to protect themselves from online fraud and identity theft than a year ago, according to a Trulioo research. The research found 76% of …

Don't miss

Cybersecurity news