Please turn on your JavaScript for this page to function normally.
Utilizing Big Data course
Gain free access to Utilizing Big Data course, a $200 value

With in-person education events and conferences cancelled or postponed indefinitely, online courses are becoming the new normal for earning CPEs. (ISC)² has an online library …

vBulletin
vBulletin fixes critical vulnerability, patch immediately!

If you’re using vBulletin to power your online forum(s), you should implement the newest security patches offered by the developers as soon as possible. The patches fix …

SaltStack
Have you updated SaltStack Salt? Attacks are underway!

Have you updated your SaltStack Salt “masters” and made them inaccessible over the internet – or at least restricted access to them? Even though F-Secure …

money
Leveraging automation to maximize security budgets

With the economic impact of COVID-19 increasingly looking like an imminent recession and the way we do work altered perhaps forever, CIOs and CISOs will most likely be …

phishing
Are you sure you would never fall for a phishing scam?

We believe we are less likely than others are to fall for phishing scams, thereby underestimating our own exposure to risk, a cybersecurity study has found. The research also …

measure
FIRST releases updated coordination principles for Multi-Party Vulnerability Coordination and Disclosure

The Forum of Incident Response and Security Teams (FIRST) has released an updated set of coordination principles – Guidelines for Multi-Party Vulnerability Coordination and …

ransomware
Ransomware on the rise, companies prioritizing disaster recovery

The rampant rise of ransomware persists, with 100% of respondents – who include ITOps, backup, disaster recovery and storage admins, application and workload owners in the …

identity
Biometric device shipments revenue to drop by $2 billion

The pandemic is expected to cause a significant pushback on biometric device shipments, creating a major revenue drop of $2 billion over the course of 2020, according to ABI …

StellarGraph
Open source algorithms for network graph analysis help discover patterns in data

StellarGraph has launched a series of new algorithms for network graph analysis to help discover patterns in data, work with larger data sets and speed up performance while …

password
Week in review: Password psychology, SaltStack Salt vulnerabilities exploited, Patch Tuesday forecast

Here’s an overview of some of last week’s most interesting news, articles and podcasts: SaltStack Salt vulnerabilities actively exploited by attackers, patch ASAP! …

biohazard
H2 2019: Duration of phishing attacks grows, use of banking trojans wanes

The lifespan of phishing attacks in H2 2019 has grown considerably and resulted in the tremendous increase in the number of phishing websites blockages, says Group-IB’s …

GitHub Code Scanning
GitHub Code Scanning aims to prevent vulnerabilities in open source software

GitHub has made available two new security features for open and private repositories: code scanning (as a GitHub-native experience) and secret scanning (both still in beta). …

Don't miss

Cybersecurity news