Please turn on your JavaScript for this page to function normally.
password
25% of IT workers don’t enforce security policies

14% of IT workers are consumed with Identity and Access Management (IAM), spending at least an hour per day on routine IAM tasks, according to 1Password. IAM continues to be a …

biohazard
Malware attacks abusing machine identities grew 8x over the last 10 years

Commodity malware campaigns utilizing machine identities are increasing rapidly, according to threat analysis from Venafi. For example, malware attacks using machine …

attacks
Cybercriminals are developing and boosting their attacks

An INTERPOL assessment of the impact of COVID-19 on cybercrime has shown a significant target shift from individuals and small businesses to major corporations, governments …

CISSP
Discounted CISSP exam prep pricing is back

This promotion has ended. Challenging times call for exceptional measures, and (ISC)² is committed to helping you keep your CISSP certification goals on track this year. …

Firefox
Firefox to block redirect tracking

Mozilla has announced a new Firefox protection feature to stymie a new user tracking technique lately employed by online advertisers: redirect tracking. How does redirect …

encryption
Engaging business units in security governance: Why everyone should be concerned

The idea that security is everyone’s business is a familiar refrain. But as enterprises look to combine the speed of software delivery with both cybersecurity and business …

Code
Security analysis of legacy programming environments reveals critical flaws

New research from Trend Micro highlights design flaws in legacy languages and released new secure coding guidelines. These are designed to help Industry 4.0 developers greatly …

identity
As personal use of managed devices becomes ubiquitous, risks increase

Netskope analyzed the most interesting trends on enterprise cloud service and app use, web and cloud-enabled threats, and cloud data migrations and transfers. Based on …

account
Many companies have not taken basic steps to protect their remote workforce

New research shows almost three quarters of large businesses believe remote working policies introduced to help stop the spread of COVID-19 are making their companies more …

brain
Ways AI could be used to facilitate crime over the next 15 years

Fake audio or video content has been ranked by experts as the most worrying use of artificial intelligence in terms of its potential applications for crime or terrorism, …

person
4 in 10 organizations punish staff for cybersecurity errors

New research has found that 42% of organizations are taking disciplinary action against staff who make cybersecurity errors. To examine the prevalence of punishment in …

PEtree
PE Tree: Free open source tool for reverse-engineering PE files

PE Tree, a malware reverse-engineering, open source tool developed by the BlackBerry Research and Intelligence team, has been made available for free to the cybersecurity …

Don't miss

Cybersecurity news