COVID-19 affects web traffic and attack trends
There have been significant changes in web attack and traffic trends as a result of COVID-19, according to Imperva. The monthly report also revealed that the Cyber Threat …
How Hoxhunt minimizes cybersecurity risks from human error
Cybersecurity has become a top priority for most companies. Many businesses have already invested significantly in security software to mitigate attacks. Corporate tech …
Multi-cloud key management and BYOK
Cloud providers such as Google Cloud Platform, AWS, and Microsoft Azure work hard to be the service provider of choice for enterprise customers. They often push the envelope …
Understanding web security solutions
As should be evident to anyone in the cyber security industry, the wide range of available web security solutions from commercial vendors will necessarily have varying degrees …
Starbleed vulnerability: Attackers can gain control over FPGAs
Field Programmable Gate Arrays, FPGAs for short, are flexibly programmable computer chips that are considered very secure components in many applications. Starbleed …
Average bandwidth of DDoS attacks increasing, APIs and applications under attack
The volume and complexity of attacks continued to grow in the first quarter of 2020, according to Link11. There has been an increasing number of high-volume attacks in Q1 …
Does working remotely actually work?
In the blink of an eye, remote work went from an experiment to a requirement. And as the results of a recent survey conducted by OnePoll reveal, work has a completely new look …
Handbook: Cyber-Risk Oversight 2020
The Internet Security Alliance (ISA) and the European Confederation of Directors’ Associations (ecoDa) released Cyber-Risk Oversight 2020, a handbook on cyber-risk management …
Week in review: Cloud migration and cybersecurity, data trending on the dark web, Zoom security
Here’s an overview of some of last week’s most interesting news and articles: What type of data is trending on the dark web? Fraud guides accounted for nearly half …
760+ malicious packages found typosquatting on RubyGems
Researchers have discovered over 760 malicious Ruby packages (aka “gems”) typosquatting on RubyGems, the Ruby community’s gem repository / hosting service. The …
New infosec products of the week: April 17, 2020
NeuVector adds to container security platform, automates end-to-end vulnerability management The platform additions include the new Vulnerability and Compliance Explorer for …
Office printers: The ticking IT time bomb hiding in plain sight
Office printers don’t have to be security threats: with foresight and maintenance they’re very easily threat-proofed. The problem is that system administrators rarely give the …