Please turn on your JavaScript for this page to function normally.
week in review
Week in review: Top 10 most exploited vulns, SMB ransomware extortion, Patch Tuesday forecast

Here’s an overview of some of last week’s most interesting news and articles: SolarWinds Orion exploited by another group of state-sponsored hackers Another group …

patch
February 2021 Patch Tuesday forecast: The human communication aspect

We spend a lot of time each month discussing the technical details surrounding vulnerabilities, software updates, and the tools we use for patch management in our …

connected car
The transportation sector needs a standards-driven, industry-wide approach to cybersecurity

Despite the uncertainties of the last year, the transformation of the transportation sector forged ahead, dominated by the prevailing trend of CASE (Connected, Autonomous, …

data
Data loss prevention strategies for long-term remote teams

Before the recent pandemic, many executives began appreciating the risks and opportunities associated with cybersecurity. A 2019 survey on cybersecurity priorities from Optiv …

industry
Number of ICS vulnerabilities disclosed in 2020 up significantly

Throughout the second half (2H) of 2020, 71% of industrial control system (ICS) vulnerabilities disclosed were remotely exploitable through network attack vectors, according …

Terminal
Enterprises average one root access orphan key on every enterprise server

SSH machine identities are critical to digital transformation strategies, as they authenticate privileged access between machines and are ubiquitous across enterprise …

tools
API adoption is on the rise across all industries

Developer reliance on APIs increased over the past year amidst the global pandemic and will continue to increase in 2021, a RapidAPI survey reveals. Organizations of all sizes …

industry
Open-source tool for hardening commonly used HMI/SCADA system

Otorio, a provider of OT security and digital risk management solutions, released an open-source tool designed for hardening the security of GE Digital’s CIMPLICITY, one …

data
Runtime data no longer has to be vulnerable data

Today, the security model utilized by nearly all organizations is so weak that the mere act of creating new data comes with the immutable assumption that such data will become …

organize
Major trends that are changing the CISO role

In a rapidly changing business environment, the role of the CISO has hugely expanded in its scope and responsibilities, a BT Security survey of over 7000 business leaders, …

Terminal
API security concerns hindering new application rollouts

66% of organizations admit to having slowed the rollout of a new application into production because of API security concerns, a Salt Security report reveals. In addition, 54% …

lock
Most are concerned about data privacy, but few are willing to change habits

Today’s consumers are willing to trade their personal data for personalization, but also have fast-growing concerns about data privacy, according to a survey by Entrust. In …

Don't miss

Cybersecurity news