Please turn on your JavaScript for this page to function normally.
CVE-2021-22779
Critical vulnerability in Schneider Electric Modicon PLCs can lead to RCE (CVE-2021-22779)

Researchers at Armis discovered an authentication bypass vulnerability (CVE-2021-22779) in Schneider Electric’s Modicon programmable logic controllers (PLCs) that can …

user
It takes more than MFA to beat human hacking

While multi-factor authentication (MFA) is a much-needed addition to an effective cyber defense strategy, it is by no means foolproof. In fact, no single security effort can …

Microsoft space
How Microsoft is taking cloud-powered innovation beyond Earth with Azure Space

The space community is growing rapidly and Microsoft’s Space team is developing capabilities and services to meet its needs for extended connectivity across the world, …

user
Addressing the cybersecurity skills gap: Where do we go from here?

There are an estimated 3.12 million cybersecurity jobs that need to be filled – more than double the current number of workers in this field. With this drastic gap, it is …

Shark
A more dynamic approach is needed to tackle today’s evolving cybersecurity threats

For decades, the cybersecurity industry has followed a defense-in-depth strategy, which allowed organizations to designate the battlefield against bad actors at their edge …

insider threat
What is the cost of an insider data breach?

As companies emerge from the pandemic, and 40% of employees are planning to switch jobs, corporate data is at risk. Files are being uploaded, shared, synced and emailed by …

People
Hiring by technology companies continues to grow

Hiring by technology companies continues on a growth path with tech firms adding 10,500 workers in June and 80,600 through the first half of 2021, an analysis by CompTIA …

PCI
1 in 5 companies fail PCI compliance assessments of their infrastructure

According to a recent poll by SentryBay, the infrastructure of over 21% of surveyed companies has failed key PCI compliance assessments, designed to assist them to maintain …

vmware 2020 threat landscape
2020 threat landscape: See what evaded perimeter defenses

Today’s reality is that security breaches are a given. Sophisticated attackers are too numerous and too determined to get caught by perimeter defenses. It’s relatively easy to …

risk
How do I select a third-party risk management solution for my business?

COVID-19 has increased organizational focus on third-party risk management (TPRM) for 83% of companies, a recent study reveals. Yet, only 40% of organizations report expanding …

organize
Understanding and stopping 5 popular cybersecurity exploitation techniques

With more than 550,000 new malware samples being discovered every day, closing the security gaps that enable these cyberthreats to access systems should be a priority for …

woman
Paving the way for women in industrial cybersecurity research

The professional journey an individual takes is heavily influenced by the people they are surrounded with throughout their life. From an early age, I knew I wanted to study …

Don't miss

Cybersecurity news