Please turn on your JavaScript for this page to function normally.
IoT
European standards org releases consumer IoT cybersecurity standard

The European Telecommunications Standards Institute (ETSI) has released ETSI TS 103 645, a standard for cybersecurity in the Internet of Things, to establish a security …

success
Free decryption tool could save victims millions in ransomware payments

A new decryption tool has been released for free on the No More Ransom depository for the latest strand of GandCrab. This tool was developed by the Romanian Police in close …

world biohazard
Detecting Trojan attacks against deep neural networks

A group of researchers with CSIRO’s Data61, the digital innovation arm of Australia’s national science agency, have been working on a system for run time detection of trojan …

secure
Webinar: Defending account takeovers at Remitly

Account Takeover attacks don’t follow conventional attack patterns – they look, act, and feel like legitimate users. Without the right tooling, visibility into …

critical infrastructure
IT security incidents affecting German critical infrastructure are on the rise

The number of IT security incidents reported by critical infrastructure companies in Germany has soared. In 2017, the German Federal Office for Security in Information …

RSA Conference
How RSA Conference 2019 brings diverse security professionals together

With RSA Conference 2019 USA just two weeks away, we asked Sandra Toms, Vice President and Curator, RSA Conference, to tell us more about the challenges involved in developing …

NGINX
Building security into cloud native apps with NGINX

Companies like Airbnb, Uber and DoorDash, which have a cloud-based software infrastructure as one of their main enablers, are disrupting the hospitality, transportation and …

Password
Indicators of poor password hygiene exposed

The recovered compromised credentials and personally identifiable information (PII) as well as the identified trends in online security habits and the data criminals tend to …

degree
74% of organizations face outages due to expired certificates

As information security budgets grow and funds are allocated to protect the defensive perimeter, many companies have overlooked the critical importance of digital certificate …

mobile device
The importance of consumer trust in the second-hand mobile market

58 percent of global consumers have yet to trade in an old mobile device, though almost two-thirds (64%) globally reported they would be willing to do so if more stringent …

earth
2018 saw 6,515 reported breaches, exposing 5 billion sensitive records

There were 6,515 publicly disclosed data compromise events through December 31, 2018, exposing over 5 billion sensitive records, according to Risk Based Security’s Year …

complex
Week in review: RunC, Snapd flaws, Zero Trust browsing, 5 years of NIST Cybersecurity Framework

Here’s an overview of some of last week’s most interesting news and articles: Machine learning fundamentals: What cybersecurity professionals need to know In this …

Don't miss

Cybersecurity news