Please turn on your JavaScript for this page to function normally.
satellite
Securing satellites: The new space race

A decade ago, it would have cost you a billion dollars to deploy a satellite into space. Fast forward ten years and you can now have your own personal satellite floating in …

Verizon
C-level executives increasingly and proactively targeted by social breaches

C-level executives – who have access to a company’s most sensitive information, are now the major focus for social engineering attacks, alerts the Verizon 2019 Data Breach …

danger
3 months, 1900 reported breaches, 1.9 billion records exposed

There were 1,903 publicly disclosed data compromise events in the first three months of the year, exposing over 1.9 billion records, according to Risk Based Security. No other …

IoT
The IoT threat landscape is expanding rapidly, yet few companies are addressing third party risk factors

There is a dramatic increase in IoT-related data breaches specifically due to an unsecured IoT device or application since 2017 – from 15 percent to 26 percent – and the …

library
Whose (usage) data is it, anyway?

Around the world, business customers now demand business-to-business (B2B) SaaS companies safeguard their usage data. More importantly, they want to know how SaaS companies …

numbers
How institutions, advisors, and investors think about digital assets

Institutional investors are finding appeal in digital assets and many are looking to invest more in digital assets over the next five years, according to new research from …

Cynet platform
Cynet Free IR tool offering empowers responders to know and act against active attacks

The saying that there are two types of organizations, those that have gotten breached and those who have but just don’t know it yet, has never been more relevant, making sound …

WordPress
WordPress updates are digitally signed at last!

WordPress 5.2 is out and brings a number of functional improvements, but the great news for those who are worried about the security of their installation is the …

Cisco
Critical flaw allows attackers to take over Cisco Elastic Services Controllers

Cisco has patched a critical, remotely exploitable authentication bypass vulnerability in Cisco Elastic Services Controller (ESC), a popular enterprise software for managing …

cloud
Executing a multi-cloud strategy: Crawl, walk, run

Despite many challenges, enterprises are increasingly adopting cloud computing in an effort to become more agile, lower IT costs, and have the ability to scale. Most of those …

healthcare
Is curiosity killing patient privacy?

The digitization of healthcare is changing the face of fraud. With the growth of electronic health records (EHRs), online patient portals and virtual clinics, a wealth of …

vault
Open banking establishes new access to banks’ networks, creating additional security issues

As more markets adopt open banking — which mandates banks to open their systems to third parties — it will be increasingly critical for banks to ensure the security of not …

Don't miss

Cybersecurity news