Kubescape helps admins manage Kubernetes securely
Kubescape is an open-source tool for testing if Kubernetes is deployed securely, as defined in the recently released Kubernetes Hardening Guidance by NSA and CISA. About …
How do I select an automated red teaming solution for my business?
Red teaming is an essential part of an organization’s security assessment process. It is generally done manually to uncover possibile vulnerabilities and security gaps, …
Security and compliance still a challenge for container architectures
While adoption of container architectures and microservices continues at an impressive pace, maintaining automated and proactive security and compliance is a particularly …
Adverse security implications of enterprises network overprovisioning
Accedian released a research study examining the adverse security implications of network overprovisioning in enterprises and the common practices and concerns surrounding it. …
IoT market to reach $1.5 trillion by 2027, security top priority
Driven by increased adoption of smart sensors integrated into connected devices, the Internet of Things (IoT) market segment is projected to reach $1.5 trillion by 2027. These …
ProxyShell vulnerabilities actively exploited to deliver web shells and ransomware
Three so-called “ProxyShell” vulnerabilities are being actively exploited by various attackers to compromise Microsoft Exchange servers around the world, the …
Why automated pentesting won’t fix the cybersecurity skills gap
The modern threat landscape is an enormous challenge for the modern enterprise. Many organizations are “addressing” this by buying the newest security products from the latest …
Things that are easy to miss in the race towards hybrid working and the cloud
The mega-trend towards hybrid working and cloud migration seems unstoppable. But customer service organizations could find their wheels come off if they fail to address a …
58% of IT leaders worried their business could become a target of rising nation state attacks
HP Wolf Security released the findings of a global survey of 1,100 IT decision makers (ITDMs), examining their concerns around rising nation state attacks. 72% of respondents …
ICS vulnerabilities disclosed in H1 2021 rose by 41%
Industrial control system (ICS) vulnerability disclosures are drastically increasing as high-profile cyberattacks on critical infrastructure and industrial enterprises have …
Key email threats and the high cost of BEC
Area 1 Security published the results of a study analyzing over 31 million threats across multiple organizations and industries, with new findings and warnings issued by …
The impact of eCommerce fraud on retailers and shoppers
There’s a stark disconnect between retailers and shoppers on the matter of eCommerce fraud, Riskified reveals. The research, which comprised 4,000 consumers and 400 …
Featured news
Resources
Don't miss
- 48,000+ internet-facing Fortinet firewalls still open to attack
- Acronis CISO on why backup strategies fail and how to make them resilient
- Ransomware attackers are “vishing” organizations via Microsoft Teams
- Scam Yourself attacks: How social engineering is evolving
- Addressing the intersection of cyber and physical security threats