Please turn on your JavaScript for this page to function normally.
IoT
Guide: Security measures for IoT product development

The European Union Agency for Cybersecurity (ENISA) released its Guidelines for Securing the IoT, which covers the entire IoT supply chain – hardware, software and services. …

Oracle
Most UK businesses using Oracle E-Business Suite are running old systems

The majority of UK businesses using Oracle E-Business Suite (EBS) are running on old versions of the business critical ERP system, according to a Claremont study. Of the 154 …

ISC2 report
What’s stopping job seekers from considering a career in cybersecurity?

The cybersecurity industry no longer has an image problem, but many things are still stopping individuals from considering a career in cybersecurity: a high cost of entry (the …

lock
End-to-end encrypted communication mitigates enterprise security risk and ensures compliance

It is a mathematical certainty that data is more protected by communication products that provide end-to-end encryption (E2EE). Yet, many CISOs are required to prioritize …

user
Every employee has a cybersecurity blind spot

80% of companies say that an increased cybersecurity risk caused by human factors has posed a challenge during the COVID-19 pandemic, particularly in times of heightened …

Money
Exploring the progress organizations are making in their investments towards digital resiliency

Overall investments in digital resiliency have increased steadily throughout the year as businesses prioritize or accelerate adoption of cloud, collaborative, and digital …

red
Developing a quantum network that exchanges information across long distances by using photons

Researchers at the University of Rochester and Cornell University have taken an important step toward developing a communications network that exchanges information across …

abstract
Week in review: Windows zero-day exploited, Patch Tuesday forecast, selecting a compliance solution

Here’s an overview of some of last week’s most interesting news, reviews and articles: Git LFS vulnerability allows attackers to compromise targets’ Windows …

block
Quantum computers: How to prepare for this great threat to information security

The race is on to build the world’s first reliable and truly useful quantum computer, and the finish line is closer than you might think – we might even reach it this …

infosec products of the week
New infosec products of the week: November 6, 2020

Qualys Container Runtime Security: Defense for containerized applications Qualys Runtime Container Security, once instrumented in the image, will work within each container …

identity theft
What is ad fraud and how can advertisers fight against it?

According to HP Enterprise’s Business of Hacking report, ad fraud is the easiest and most lucrative form of cybercrime, above activities such as credit card fraud, payment …

fake
How fake news detectors can be manipulated

Fake news detectors, which have been deployed by social media platforms like Twitter and Facebook to add warnings to misleading posts, have traditionally flagged online …

Don't miss

Cybersecurity news