Please turn on your JavaScript for this page to function normally.
SSD
Things to consider when selecting enterprise SSDs for critical workloads

The process of evaluating solid state drives (SSDs) for enterprise applications can present a number of challenges. You want maximum performance for the most demanding servers …

identity theft
Most consumers believe government regulation should help address privacy risks

As consumers’ concerns about their digital privacy continue to grow and who is responsible for guarding it remains unclear, new research conducted by Ponemon Institute …

fix
Businesses are preparing for a cloud-based approach to applications

While most enterprises are committed to modernizing their application software portfolios, there are still myriad challenges to overcome and improvements to be made, according …

drown
Security teams increasingly stressed due to lack of proper tools, executive support

93% of security professionals lack the tools to detect known security threats, and 92% state they are still in need of the appropriate preventative solutions to close current …

Public cloud environments leave numerous paths open for exploitation

As organizations across industries rapidly deploy more assets in the public cloud with Amazon, Microsoft, and Google, they’re leaving numerous paths open for exploitation, …

vote
Assessing the email security controls used by 10,000 U.S. state and local election administrators

With fewer than 100 days left until Election Day, a new report from Area 1 Security reveals that states are still in widely varying stages of cybersecurity readiness. Key …

find
Building a quantum internet: Fast data exchange, difficult to eavesdrop

The U.S. Department of Energy (DOE) unveiled a report that lays out a blueprint strategy for the development of a national quantum internet. It provides a pathway to ensure …

signal
UCaaS market to reach $24.3 billion by 2026

The global Unified Communications as a Service (UCaaS) market size was valued at $13.8 billion in 2019 and is anticipated to reach $24.3 billion at a CAGR of 8.4% from 2020 to …

stairs
Researchers find critical RCE vulnerabilities in industrial VPN solutions

Critical vulnerabilities in several industrial VPN implementations for remotely accessing operational technology (OT) networks could allow attackers to overwrite data, execute …

QNAP
62,000 QNAP NAS devices infected with persistent QSnatch malware

There are approximately 62,000 malware-infested QNAP NAS (Network Attached Storage) devices located across the globe spilling all the secrets they contain to unknown cyber …

NIST mask research
How well do face recognition algorithms identify people wearing masks?

Now that so many of us are covering our faces to help reduce the spread of COVID-19, how well do face recognition algorithms identify people wearing masks? The answer, …

Cyber Warfare - Truth, Tactics, and Strategies
Review: Cyber Warfare – Truth, Tactics, and Strategies

Dr. Chase Cunningham holds a Ph.D. and M.S. in computer science from Colorado Technical University and a B.S. from American Military University focused on counter-terrorism …

Don't miss

Cybersecurity news