Please turn on your JavaScript for this page to function normally.
ISO
Thousands of ISO certifications at risk of lapsing due to halted re-certification audits

Thousands of valuable ISO management system certifications earned by UK companies may now be at risk because auditors from Certification Bodies may not have been able to …

CCSP training
Expand your cloud expertise: Discount on CCSP training

This promotion has ended. Challenging times call for exceptional measures. And (ISC)² is committed to helping you keep your Certified Cloud Security Professional (CCSP) …

fileless worm
Fileless worm builds cryptomining, backdoor-planting P2P botnet

A fileless worm dubbed FritzFrog has been found roping Linux-based devices – corporate servers, routers and IoT devices – with SSH servers into a P2P botnet whose …

Kali Linux 2020.3
Kali Linux 2020.3 released: A new shell and a Bluetooth Arsenal for NetHunter

Offensive Security has released Kali Linux 2020.3, the latest iteration of the popular open source penetration testing platform. You can download it or upgrade to it. Kali …

FIDO
Five ways to maximize FIDO

Perform a quick Google search for “causes of data breaches”, and you will be inundated with reports of stolen credentials and weak passwords. Organizations can spend billions …

identity
The benefits of providing employees with an identity compromise solution

Employees find significant value in having access to an identity compromise solution, having an available remediation solution creates a better mindset for those that use it, …

telehealth
Telehealth is the future of healthcare, but how secure is it?

54 percent of Americans have opted for virtual visits during pandemic, a CynergisTek survey reveals. Of those, more than 70 percent of respondents plan to continue to use …

cloud
Large-scale migrations away from on-premise environments are underway

COVID-19 has had a massive effect on DevOps, leading to large-scale migrations away from on-premises environments, a Codefresh survey reveals. At the same time, DevOps …

server
Computer scientists create benchmarks to advance quantum computer performance

Two UCLA computer scientists have shown that existing compilers, which tell quantum computers how to use their circuits to execute quantum programs, inhibit the …

error
Updated cryptojacking worm steals AWS credentials

A malicious cryptocurrency miner and DDoS worm that has been targeting Docker systems for months now also steals Amazon Web Services (AWS) credentials. What’s more, …

Google Chrome
Chrome 86 will prominently warn about insecure forms on secure pages

Entering information into and submitting it through insecure online forms will come with very explicit warnings in the upcoming Chrome 86, Google has announced. The new alerts …

risk assessment
How do I select a risk assessment solution for my business?

One of the cornerstones of a security leader’s job is to successfully evaluate risk. A risk assessment is a thorough look at everything that can impact the security of …

Don't miss

Cybersecurity news