Please turn on your JavaScript for this page to function normally.
week in review
Week in review: Kali Linux 2021.1, CNAME-based tracking, VMware vCenter Servers under attack

Here’s an overview of some of last week’s most interesting news and articles: Attackers are looking to exploit critical VMware vCenter Server RCE flaw, patch ASAP! …

search
Closing the data divide: How to create harmony among data scientists and privacy advocates

Balancing data privacy within an organization is no easy task, particularly for data scientists who need quick access to data, and security and governance teams whose job it …

email
The rise of non-English language spear phishing emails

Business email compromise (BEC) threats are one of the many tried-and-tested tactics cybercriminals use to target their victims. These tend to be brief messages with only a …

attacks
Massive rise in threats across expanding attack surfaces

There was a massive increase in cyber threats globally year-over-year fueled by both the pandemic and expanding attack surfaces, Skybox Security reveals. Expanding attack …

password
One in four people use work passwords for consumer websites

Employees working from home on a company-provided computer are demonstrating a clear lack of cybersecurity knowledge through high-risk behavior, according to a report released …

containers
Application container market to grow steadily by 2026

The application container market is expected to register a CAGR of 29% over the forecast period 2021 to 2026, according to ResearchAndMarkets. Increasing deployments of …

industry
ICS threat landscape highlights

Dragos releases annual analysis of ICS/OT focused cyber threats, vulnerabilities, assessments, and incident response insights. “In 2020, the industrial community performed …

vmware
Attackers are looking to exploit critical VMware vCenter Server RCE flaw, patch ASAP!

The day after VMware released fixes for a critical RCE flaw (CVE-2021-21972) found in a default vCenter Server plugin, opportunistic attackers began searching for publicly …

architecture
Why enterprises need rugged devices with integrated endpoint management systems

The debate within business organizations of whether to use consumer devices or to invest in rugged devices for the operations side of their business is as old as personal …

identity
Five factors driving investment in IDV

For billions of individuals around the world, digital identity became critical in 2020. As a result, the global identity verification market, which was already growing rapidly …

hand
Attackers disrupting COVID-19 efforts and critical supply chains

Cyberattacks evolved in 2020 as threat actors sought to profit from the unprecedented socioeconomic, business and political challenges brought on by the COVID-19 pandemic, IBM …

businessman
C-level executives driving the adoption of MACH across their organizations

Out with the old, in with MACH. That’s what a poll of global IT leaders found regarding their plans to revamp, or retain, their enterprise architectures. The research, …

Don't miss

Cybersecurity news