Please turn on your JavaScript for this page to function normally.
architecture
Only 12% of banks appear to be fully committed to digital transformation

The US$1 trillion that traditional retail and commercial banks have invested globally over the past three years to transform their IT operations has not yet delivered the …

automate
Week in review: Kali Linux roadmap, runtime container security, new issue of (IN)SECURE

Here’s an overview of some of last week’s most interesting news, articles and podcasts: Research shows Tesla Model 3 and Model S are vulnerable to GPS spoofing attacks Tesla …

Dell laptop
Dell fixes high-risk vulnerability in pre-installed SupportAssist software

Dell pushed out fixes for a high-risk vulnerability in its pre-installed SupportAssist software and urges users who don’t have auto updating enabled to upgrade the …

CipherCloud
New infosec products of the week: June 21, 2019

Scytale Enterprise version 1.0 to scale service-to-service authentication Scytale released Scytale Enterprise 1.0, a SaaS platform that enables security and infrastructure …

wireless
Countering industrial cyberthreats with secure, standards-based, licensed wireless networks

Over the past few years, cyber threats aimed at a number of critical infrastructure targets have drawn our attention to the security of mission critical networks. These …

Android apps
High-risk vulnerabilities found in 1/3 of iOS apps, nearly half of Android apps

Expert testing of iOS and Android mobile applications shows that in most cases, insecure data storage is the most common security flaw in mobile apps. Positive Technologies’ …

money
Insured losses from a cyber catastrophe could reach billions

Analysis shows insured business interruption losses from a cyber catastrophe could reach an estimated $3.25 billion. Kovrr, a predictive cyber risk modeling company, released …

road
41.6 billion IoT devices will be generating 79.4 zettabytes of data in 2025

The number of devices connected to the Internet, including the machines, sensors, and cameras that make up the Internet of Things (IoT), continues to grow at a steady pace. A …

docker
Webinar: Inside a Docker cryptojacking exploit

In this webinar, Ethan Hansen, Security Analyst for Threat Stack’s Cloud Security Operations Program, will discuss recently observed Docker exploit attempts from the field, …

Cisco
Cisco fixes critical vulnerabilities in its SD-WAN, DNA Center solutions

Cisco has released another batch of fixes for many of its products, including its SD-WAN and DNA Center solutions, its Email Security Appliance, Security Manager, SOHO …

(IN)SECURE 62
(IN)SECURE Magazine issue 62 released

(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 62 has been released today. Table of contents …

cube
IoT explodes worldwide, researchers investigate security issues present in the devices real users own

About 40 percent of households across the globe now contain at least one IoT device, according to Avast. In North America, that number is almost double, at 66 percent, …

Don't miss

Cybersecurity news