Please turn on your JavaScript for this page to function normally.
Healthcare IoT
The challenges of cyber research and vulnerability disclosure for connected healthcare devices

As Head of Research at CyberMDX, Elad Luz gathers and analyzes information on a variety of connected healthcare devices in order to improve the techniques used to protect them …

RSAC
Sessions, events and seminars to check out at RSA Conference 2020

RSA Conference 2020 takes place next week in San Francisco. Here’s a brief overview of what to check out while you’re at the conference. Read more about keynotes here. Monday …

fist
Focus on cyber resilience increasing sharply as oil companies seek to protect their assets

Cybersecurity has emerged as the top focus of upstream oil and gas companies’ digital investments, according to a report from Accenture. The report is based on a global survey …

cloud
IT and business process automation growing with cloud architectures

Many organizations are starting to realize the benefits of increased scale and velocity of application deployment in their businesses, according to F5 Networks. This value, …

code
Three API security risks in the wake of the Facebook breach

Facebook recently pledged to improve its security following a lawsuit that resulted from a 2018 data breach. The breach, which was left open for more than 20 months, resulted …

tools
SecOps teams face challenges in understanding how security tools work

Security professionals are overconfident in their tools with 50% reporting that they have experienced a security breach because one or more of their security products was not …

error
Researchers design a tool to identify the source of errors caused by software updates

We’ve all shared the frustration when it comes to errors – software updates that are intended to make our applications run faster inadvertently end up doing just …

bulb
Key technology trends that will redefine businesses over the next three years

To compete and succeed in a world where digital is everywhere, companies need a new focus on balancing “value” with “values,” aligning their drive to create business value …

complex
Week in review: The future of DNS security, acquiring cyber talent in 2020, new issue of (IN)SECURE

Here’s an overview of some of last week’s most interesting news and articles: Shadow IT accounts with weak passwords endanger organizations 63% of enterprise …

RSA Adaptive Authentication
New infosec products of the week: February 14, 2020

RSA Archer SaaS: An integrated approach to managing risk RSA Archer SaaS can help reduce the time and resources dedicated to on-premise platform upgrades, patches, and …

healthcare
Seven cybersecurity and privacy forecasts for 2020

The developments in the area of cybersecurity are alarming. As the number of smart devices in private households increases, so do the opportunities for cyber criminals to …

spreadsheet
43% of IT professionals are still tracking assets in spreadsheets

43% of IT professionals report using spreadsheets as one of their resources for tracking assets, according to Ivanti. Further, 56% currently do not manage the entire asset …

Cybersecurity news