Open-source tool BlobHunter helps pinpoint public Azure blobs that might contain sensitive files
CyberArk researchers have released BlobHunter, an open-source tool organizations can use to discover Azure blobs containing sensitive files they have inadvertently made …
Three ways MITRE ATT&CK can improve your organizational security
There’s a good reason everyone’s talking about MITRE ATT&CK: it’s an objective, third-party standard with which organizations can measure their own detection coverage, as …
How do I select a remote access solution for my business?
Protecting the remote workforce will be enterprises’ prime focus in 2021, according to a recent survey of IT leaders. IT teams struggled in the early days of the pandemic, …
Organizations can no longer afford a reactive approach to risk management
Board members and C-suite executives around the globe are most concerned in 2021 with risks associated with COVID-19-related government policies and regulations, economic …
Empowering a remote workforce is a top priority for CEOs
A top challenge for many CEOs over the next few years is managing a remote workforce, a new IBM Institute for Business Value (IBV) study reveals. CEOs of outperforming …
Researchers develop approach that can recognize fake news
Social media is increasingly used to spread fake news. The same problem can be found on the capital market – criminals spread fake news about companies in order to …
Identity verification market to grow steadily in the next few years
The identity verification market is expected to grow at a CAGR of 13.1% over the forecast period 2020 to 2025, according to ResearchAndMarkets. Adoption of solutions through …
Week in review: Top 10 most exploited vulns, SMB ransomware extortion, Patch Tuesday forecast
Here’s an overview of some of last week’s most interesting news and articles: SolarWinds Orion exploited by another group of state-sponsored hackers Another group …
February 2021 Patch Tuesday forecast: The human communication aspect
We spend a lot of time each month discussing the technical details surrounding vulnerabilities, software updates, and the tools we use for patch management in our …
The transportation sector needs a standards-driven, industry-wide approach to cybersecurity
Despite the uncertainties of the last year, the transformation of the transportation sector forged ahead, dominated by the prevailing trend of CASE (Connected, Autonomous, …
Data loss prevention strategies for long-term remote teams
Before the recent pandemic, many executives began appreciating the risks and opportunities associated with cybersecurity. A 2019 survey on cybersecurity priorities from Optiv …
Number of ICS vulnerabilities disclosed in 2020 up significantly
Throughout the second half (2H) of 2020, 71% of industrial control system (ICS) vulnerabilities disclosed were remotely exploitable through network attack vectors, according …
Featured news
Resources
Don't miss
- AI isn’t one system, and your threat model shouldn’t be either
- LLMs work better together in smart contract audits
- Product showcase: NAKIVO v11.1 advances MSP service delivery with secure multi-tenant management
- Crypto theft in 2025: North Korean hackers continue to dominate
- Clipping Scripted Sparrow’s wings: Tracking a global phishing ring