Please turn on your JavaScript for this page to function normally.
work
Security holding back employers from meeting employees’ remote working expectations

Less than a third (32%) of UK workers are allowed to work remotely whenever they want, according to research from Capita which uncovers employee attitudes to remote/flexible …

BEC scams
281 BEC scammers arrested in worldwide law enforcement action

Federal authorities announced a significant coordinated effort to disrupt Business Email Compromise (BEC) schemes that are designed to intercept and hijack wire transfers from …

patch
September 2019 Patch Tuesday: Microsoft plugs two actively exploited zero-days

For the September 2019 Patch Tuesday, Microsoft delivered fixes for 80 CVE-numbered security issues (including to actively exploited zero-days), Adobe fixed flaws in Flash …

password
Regulations are driving innovation toward an identity layer on the Internet

The security community often points to the inherent lack of an encryption layer on the Internet as a factor behind many of the related threat vectors. The decentralized nature …

cybercrime
Fraudsters no longer operate in silos, they are attacking across industries and organizations

From January 2019 through June 2019, LexisNexis Risk Solutions recorded 16.4 billion transactions, of which 277 million were human-initiated attacks, a 13% increase over the …

Review: Cyberdanger

Whether you’re already familiar with cybersecurity or want to educate yourself on the topic, Cyberdanger is a great read. The author, Eddy Willems, is a well-known expert in …

IoT
IoT attacks increasing in the cyber underground

Cybercriminals from around the world are actively discussing how to compromise connected devices, and how to leverage these devices for moneymaking schemes, according to Trend …

PPT security template
Download PPT template: Security for Management

Since management people are not typically cybersecurity savvy, engaging them can be challenging – one must find the balance between high-level explanations, a direct …

Office 365 security: Automated incident response based on playbooks

Five months after introducing Automated Incident Response in Office 365 ATP, Microsoft has announced it’s making it more widely available. Customers who have opted for …

brain
ML, AI enthusiasts to showcase cyber solutions at HITB+ CyberWeek’s AI Challenge

Held annually in Asia, Europe and the Middle East, Hack In The Box conferences bring together the world’s top cyber security experts to share and discuss their latest …

click
More than 99% of cyberattacks rely on human interaction

Cybercriminals target people, rather than systems and infrastructure, to install malware, initiate fraudulent transactions, steal data, and more, according to Proofpoint. …

shadow
Shine a light on shadow IT to improve organizational resilience

Shadow IT is one of the biggest challenges facing organizations today. According to Gartner, by 2020, a third of all cybersecurity attacks experienced by enterprises will be …

Don't miss

Cybersecurity news