The CISO’s Guide to Third-Party Security Management
The CISO’s Guide to Third-Party Security Management provides the instructions you need to make your organization’s third-party security program effective and …
Google aims to improve security of browser engines, third-party Android devices and apps on Google Play
Google has announced two new security initiatives: one is aimed at helping bug hunters improve the security of various browsers’ JavaScript engines, the other at helping …
Nmap 7.90 released: New fingerprints, NSE scripts, and Npcap 1.0.0
Over a year has passed since Nmap had last been updated, but this weekend Gordon “Fyodor” Lyon announced Nmap 7.90. About Nmap Nmap is a widely used free and …
Why developing cybersecurity education is key for a more secure future
Cybersecurity threats are growing every day, be they are aimed at consumers, businesses or governments. The pandemic has shown us just how critical cybersecurity is to the …
Is IoT vital for the future success of businesses?
Vodafone Business launched a report focused on the impact IoT is having on businesses at a time when their digital capabilities are put to the test by the COVID-19 pandemic. …
Why CIOs need to focus on password exposure, not expiration
The cybersecurity market is growing even in the midst of the pandemic-driven economic downturn, with spending predicted to reach $123 billion by the end of the year. While …
Preventing ecommerce fraud: A look at current trends and patterns
Forter released its Fraud Attack Index, delivering in-depth insight into the impact of COVID-19 on online buyer behavior and ecommerce fraud trends. This edition revealed …
Public cloud IT infrastructure spending exceeds that for non-cloud IT infrastructure
Vendor revenue from sales of IT infrastructure products (server, enterprise storage, and Ethernet switch) for cloud environments, including public and private cloud, increased …
NIST crowdsourcing challenge aims to de-identify public data sets to protect individual privacy
NIST has launched a crowdsourcing challenge to spur new methods to ensure that important public safety data sets can be de-identified to protect individual privacy. The …
Finish the year strong with special pricing on CISSP training thru Oct. 30
Go for CISSP certification now to achieve more in 2021 as a globally recognized cybersecurity leader. Whether you’re motivated by career advancement, higher pay or inspiring a …
Week in review: Hardware security, protecting APIs, determining the true impact of a cyber attack
Here’s an overview of some of last week’s most interesting news, reviews and articles: The biggest cyber threats organizations deal with today Microsoft has …
Companies that facilitate ransomware payments risk violating US sanctions
Companies that ransomware-hit US organizations hire to facilitate the paying of the ransom are at risk of breaking US sanctions, falling afoul of the US Department of the …
Featured news
Resources
Don't miss
- Deploying AI at the edge: The security trade-offs and how to manage them
- Cybercrime forums Cracked and Nulled seized, operators arrested
- SimpleHelp RMM vulnerabilities may have been exploited to breach healthcare orgs
- Zscaler CISO on balancing security and user convenience in hybrid work environments
- ExtensionHound: Open-source tool for Chrome extension DNS forensics