Please turn on your JavaScript for this page to function normally.
camera
Exposing the privacy risks of home security cameras

An international study has used data from a major provider of home IP security cameras to evaluate potential privacy risks for users. Privacy-compromising information IP home …

shield
Better cybersecurity hinges on understanding actual risks and addressing the right problems

SANS Technology Institute’s Internet Storm Center (ISC) has been a valuable warning service and source of critical cyber threat information to internet users, …

healthcare
Business efficiency metrics are more important than detection metrics

With cyberattacks on the rise, today’s security professionals are relying primarily on detection metrics – both key performance indicators (KPIs) and key risk indicators …

Elasticsearch
Elasticsearch security: Understand your options and apply best practices

The ever-escalating popularity of Elasticsearch – the distributed open source search and log analytics engine that has become a staple in enterprise application developers’ …

DJI drone
Researchers discover how to pinpoint the location of a malicious drone operator

Researchers at Ben-Gurion University of the Negev (BGU) have determined how to pinpoint the location of a drone operator who may be operating maliciously or harmfully near …

backup
Global data center networking market to reach $40.9 billion by 2025

The global data center networking market is projected to reach $40.9 billion by 2025 and projected to register 11.0% CAGR over the forecast period, from 2019 to 2025 according …

F5
Attackers are breaching F5 BIG-IP devices, check whether you’ve been hit

Attackers are actively trying to exploit CVE-2020-5902, a critical vulnerability affecting F5 Networks‘ BIG-IP multi-purpose networking devices, to install coin-miners, …

architecture
Data exfiltration: The art of distancing

We have all seen the carefully prepared statement. A cyber incident has occurred, we are investigating but please do not worry since no data has left our network. Perhaps we …

application
Cybersecurity software sales and training in a no-touch world

The pandemic has led to an outbreak of cybercriminal activity focused on remote workers and enterprises that needed to quickly migrate to the cloud to maintain business …

Cybersecurity Threats, Malware Trends, and Strategies
Review: Cybersecurity Threats, Malware Trends, and Strategies

Tim Rains, who formerly held many essential roles at Microsoft and is currently working at Amazon Web Services as Regional Leader for Security and Compliance Business …

connection
Managers and employees support digital transformation, but see room for improvement

Digital transformation has widespread support among managers and employees, but some think that the pace of change at their companies could be faster, they could be more …

error
Week in review: MacOS ransomware, attackers bypassing WAFs, how to select a SIEM solution

Here’s an overview of some of last week’s most interesting news, articles and reviews: Critical flaw opens Palo Alto Networks firewalls and VPN appliances to …

Don't miss

Cybersecurity news