Please turn on your JavaScript for this page to function normally.
cloud
Public cloud IT infrastructure spending exceeds that for non-cloud IT infrastructure

Vendor revenue from sales of IT infrastructure products (server, enterprise storage, and Ethernet switch) for cloud environments, including public and private cloud, increased …

NIST
NIST crowdsourcing challenge aims to de-identify public data sets to protect individual privacy

NIST has launched a crowdsourcing challenge to spur new methods to ensure that important public safety data sets can be de-identified to protect individual privacy. The …

(ISC)²
Finish the year strong with special pricing on CISSP training thru Oct. 30

Go for CISSP certification now to achieve more in 2021 as a globally recognized cybersecurity leader. Whether you’re motivated by career advancement, higher pay or inspiring a …

complex
Week in review: Hardware security, protecting APIs, determining the true impact of a cyber attack

Here’s an overview of some of last week’s most interesting news, reviews and articles: The biggest cyber threats organizations deal with today Microsoft has …

money
Companies that facilitate ransomware payments risk violating US sanctions

Companies that ransomware-hit US organizations hire to facilitate the paying of the ransom are at risk of breaking US sanctions, falling afoul of the US Department of the …

Cohesity SiteContinuity
New infosec products of the week: October 2, 2020

Cohesity SiteContinuity: Protecting business-critical apps across a single platform Cohesity SiteContinuity is an automated disaster recovery solution that is integrated with …

drown
Inadequate skills and employee burnout are the biggest barriers to digital transformation

Nearly six in ten organizations have accelerated their digital transformation due to the COVID-19 pandemic, an IBM study of global C-suite executives revealed. Top priorities …

password
Is passwordless authentication actually the future?

While passwords may not be going away completely, 92 percent of respondents believe passwordless authentication is the future of their organization, according to a LastPass …

Facepalm
Average data queries take too long, yet organizations need daily data insights to make decisions

58% of organizations make decisions based on outdated data, according to an Exasol research. The report reveals that 84% of organizations are under increasing pressure to make …

printer
HP expands its Bug Bounty Program to focus on office-class print cartridge security vulnerabilities

HP has expanded its Bug Bounty Program to focus specifically on office-class print cartridge security vulnerabilities. The program underscores HP’s commitment to delivering …

NVIDIA
Use an NVIDIA GPU? Check whether you need security updates

NVIDIA has released security updates for the NVIDIA GPU Display Driver and the NVIDIA Virtual GPU Manager that fix a variety of serious vulnerabilities. The driver security …

Three immediate steps to take to protect your APIs from security risks

In one form or another, APIs have been around for years, bringing the benefits of ease of use, efficiency and flexibility to the developer community. The advantage of using …

Don't miss

Cybersecurity news