Please turn on your JavaScript for this page to function normally.
ISC2 report
How much risk small businesses really pose to supply chain cybersecurity?

50% of large enterprises view third-party partners of any size as a cybersecurity risk, but only 14% have experienced a breach as the result of a small business partner, while …

future
Most widely adopted digital solutions? Big data, cloud and CRM

More than 85% of companies are implementing digital transformation processes, compared to the 15% who admitted not having started their path towards digitalization yet, …

OpenSSH
OpenSSH adds protection against Spectre, Meltdown, RAMBleed

OpenSSH, a widely used suite of programs for secure (SSH protocol-based) remote login, has been equipped with protection against side-channel attacks that could allow …

law enforcement
Eurofins ransomware attack affected UK police work

Eurofins, a global provider of scientific testing services, said on Monday that operations are returning to normal after the recent ransomware attack, but that its impact on …

Fire
How past threats and technical developments influence the evolution of malware

If we want to anticipate how malware will evolve in the near future, we have to keep two things in mind: past threats and current technical developments. “The evolution …

identity
Beating biometrics: Why biometric authentication alone is not a panacea

As we witness the accelerating use of biometrics throughout our lives, we must pause to consider the risks and ramifications of doing so as technological advancements make it …

syringe
Researchers develop a technique to vaccinate algorithms against adversarial attacks

A set of techniques to effectively vaccinate algorithms against adversarial attacks have been developed by researchers from CSIRO’s Data61. Algorithms …

SD-WAN
Which SD-WAN products offer a notable return on investment?

Eight of the industry’s leading SD-WAN products were examined by NSS Labs to help enterprises understand the merits of products in the market and identify the capabilities …

find
Why poor visibility is hampering cybersecurity

Enterprises are challenged with security basics, according to Panaseer’s first Security Leader’s Peer Report. Data from an external survey of 200 enterprise …

architecture
Only 12% of banks appear to be fully committed to digital transformation

The US$1 trillion that traditional retail and commercial banks have invested globally over the past three years to transform their IT operations has not yet delivered the …

automate
Week in review: Kali Linux roadmap, runtime container security, new issue of (IN)SECURE

Here’s an overview of some of last week’s most interesting news, articles and podcasts: Research shows Tesla Model 3 and Model S are vulnerable to GPS spoofing attacks Tesla …

Dell laptop
Dell fixes high-risk vulnerability in pre-installed SupportAssist software

Dell pushed out fixes for a high-risk vulnerability in its pre-installed SupportAssist software and urges users who don’t have auto updating enabled to upgrade the …

Don't miss

Cybersecurity news