Please turn on your JavaScript for this page to function normally.
Qualys Global IT Asset Discovery and Inventory
New infosec products of the week: August 2, 2019

Qualys is making its Global IT Asset Discovery and Inventory app available to all businesses for free Qualys is making its Global IT Asset Discovery and Inventory app …

cloud
Most interesting trends on cloud service and web usage

Cloud services account for 85% of all enterprise web traffic, signaling a need for enterprises to adopt a holistic approach to securing the cloud and web, a Netskope Cloud …

IoT
Many companies don’t know the depth of their IoT-related risk exposure

In the digital age, cyber is everywhere. Cyber risk now permeates nearly every aspect of how we live and work. Organizations should better understand how to manage the risks …

finance
94% of attacks hitting financial services use one of four methods

Newly released data from Akamai’s 2019 State of the Internet / Security Financial Services Attack Economy Report has found that 50% of all unique organizations impacted by …

G Suite
G Suite news: Anomalous alert activity for Google Drive, Advanced Protection for enterprise users

Google is rolling out new security options for G Suite users and admins, aimed at alerting organizations about data exfiltration attempts on Google Drive and helping them …

innovation
Passion, ingenuity and hard work: The cybersecurity startup story of Israel

According to Start-Up Nation Central (SNC), there are currently 400 cybersecurity start-ups operating in Israel. In 2018, they raised over $1.2 billion in 96 rounds of …

Password
Microsoft is right, mandatory password changes are obsolete

Microsoft has recently come out and said that mandatory password changing is ancient and obsolete. This goes directly against everything we were trained to think for the last …

Lock
The probability that an EV SSL certificate is associated with a bad domain is 0.013%

In 2018, phishing attacks were attempted 482.5 million times, more than doubling the number of incidents in 2017. New research conducted by the Georgia Institute of Technology …

brain
Companies struggle with the slow, unpredictable nature of AI projects

Despite significant investment in AI, many companies are still struggling to stabilize and scale their AI initiatives, according to Dotscience. While 63.2% of businesses …

Apple connection
AWDL flaws open Apple users to tracking, MitM, malware planting

Vulnerabilities in Apple Wireless Direct Link (AWDL), the wireless protocol that underpins Apple’s AirPlay and AirDrop services, could allow attackers to track users in …

chess
Solving security problems: Security advice for those with limited resources

In this interview, Mark Sangster, VP & Industry Security Strategist at eSentire, gives SMBs advice on how to minimize the risk of a data breach through better security …

cloud
Orchestrating security policies across your hybrid cloud with intelligent data virtualization

The proliferation of data is causing a security and governance challenge across the hybrid cloud. Estimates project the global datasphere will grow from 33 zettabytes in 2018 …

Don't miss

Cybersecurity news