Please turn on your JavaScript for this page to function normally.
architecture
Organizations more likely to accelerate business when protecting their cloud data

Cloud services are the most significant advance in IT since the introduction of the internet itself, and most organizations today benefit from the collaboration, scalability …

5G
GSMA disproves false claims 5G systems will harm other services

The mobile industry has already demonstrated within leading international standards bodies that 5G can be used safely alongside other services, including weather sensing …

Linux
SACK TCP flaws can crash, slow down Linux-based systems

An engineering manager at Netflix has unearthed several TCP networking vulnerabilities in Linux and FreeBSD kernels that could lead to systems crashing or consuming too many …

TP-Link Wi-Fi extender
Vulnerable TP-Link Wi-Fi extenders open to attack, patch now!

Several TP-Link Wi-Fi extender devices sport a critical remote code execution vulnerability that could allow attackers to take over the devices and command them with the same …

phishing
Why phishing education has never been more critical to your business

Our cyber defenses are becoming stronger and stronger every year. Even the smallest companies can now deploy advanced anti-malware and intrusion detections tools that were, …

Europe
One year of GDPR application: Europeans well aware of their digital rights

Europeans are relatively well aware of the new data protection rules, their rights and the existence of national data protection authorities, to whom they can turn for help …

Twitter
Researchers develop app to detect Twitter bots in any language

Thanks to fruitful collaboration between language scholars and machine learning specialists, a new application that can detect Twitter bots independent of the language used …

privacy
How employees and their organizations are prioritizing data privacy

Employees in the UK expressed greater understanding of privacy laws, and better training opportunities, than those in the U.S., the ObserveIT survey reveals. The survey polled …

finance
Economic cycles and disruption are where top CFOs set their firms apart from the competition

Conflicting signals on the economy and related uncertainty should be looked upon by CFOs as an opportunity to accelerate growth and innovation strategies, according to …

DNA
Web-based DNA sequencers getting compromised through old, unpatched flaw

Unknown attackers are trying to exploit a vulnerability in dnaLIMS, a Web based bioinformatics laboratory information management system, to implant a bind shell into the …

container
What does runtime container security really mean?

End-to-end protection for containers in production is required to avoid the steep operational and reputational costs of data breaches. As news of container attacks and fresh …

collaboration
Are U.S. companies overpaying to attract new talent?

While compensation remains a top driver to attract and retain talent in the U.S., employees only expect about a 10% salary increase to switch employers, while companies are …

Don't miss

Cybersecurity news