Please turn on your JavaScript for this page to function normally.
puzzle
Preparing for the Cybersecurity Maturity Model Certification onslaught

For the Defense Industrial Base (DIB), the Department of Defense (DoD) Cybersecurity Maturity Model Certification (CMMC) compliance requirement is the hot news topic of 2021. …

malware
Multi-payload Gootloader platform stealthily delivers malware and ransomware

The delivery method for the six-year-old Gootkit financial malware has been developed into a complex and stealthy delivery system for a wide range of malware, including …

Amazon Alexa
Alexa Skills: Security gaps and data protection problems

With the voice commands “Alexa Skills,” users can load numerous extra functions onto their Amazon voice assistant. Amazon screens special voice assistant functions for …

Cybercriminals continue to target trusted cloud apps

The majority of all malware is now delivered via cloud applications, underscoring how attackers increasingly abuse popular cloud services to evade legacy security defenses …

people
Customers willing to share personal data in exchange for personalized services

There is ample opportunity for financial institutions to harness the power of AI to build more meaningful connections and experiences with customers — vastly improving both …

industrial
Critical flaw in Rockwell PLCs allows attackers to fiddle with them (CVE-2021-22681)

A critical, easy to exploit vulnerability (CVE-2021-22681) may allow attackers to remotely connect to a number of Rockwell Automation’s programmable logic controllers …

tools
Protecting the digital workplace with an integrated security strategy

COVID-19 propelled the world of IT years into the future. Organizations considering long-term digital transformation plans were abruptly forced to accelerate their timeline, …

cloud
How do I select a cloud security solution for my business?

Attackers increasingly strive to leverage cloud weaknesses that enable them to deliver malware to end users, gain unauthorized access to production environments or their data, …

analyst
Most IT security leaders lack confidence in their company’s security posture

78% of senior IT and IT security leaders believe their organizations lack sufficient protection against cyberattacks despite increased IT security investments made in 2020 to …

world
Insights for navigating a drastically changing threat landscape

In a recent report, Trend Micro announced it detected 119,000 cyber threats per minute in 2020 as home workers and infrastructure came under new pressure from attacks. Attacks …

complex
Full-stack observability: The only way technologists can deal with IT complexity

AppDynamics released its global research study, exploring the impact of the rapid acceleration of digital transformation created in response to the COVID-19 pandemic and the …

email danger
Data is most at risk on email, with 83% of organizations experiencing email data breaches

95% of IT leaders say that client and company data is at risk on email, an Egress report reveals. Additionally, an overwhelming 83% of organizations have suffered data …

Don't miss

Cybersecurity news