Please turn on your JavaScript for this page to function normally.
architecture
Week in review: Top cyber attack sources, serverless botnets, CFO as best cybersecurity friend

Here’s an overview of some of last week’s most interesting news and articles: Repairnator bot finds software bugs, successfully submits patches Can a bot create …

network
Security should be a top priority when transitioning to an SD-WAN solution

Barracuda Networks today released key findings from a new global research report, “Security, Connectivity, and Control: The Challenges and Opportunities of …

Data Theorem API
New infosec products of the week​: October 26, 2018

Data Theorem introduces automated API discovery and security inspection solution Data Theorem introduced the industry’s first automated API discovery and security inspection …

hunt
Organizations want to threat hunt, but can’t due to lack of time, skills and visibility

As cybercriminals and nation-states continue to improve the sophistication of attacks that bypass traditional preventive defenses, organizations must evolve their security …

dark
Increased dark web activity putting merchants and consumers at risk

Cybercriminals are increasingly targeting retailers and their customers through digital and social channels as retailers leverage new channels for increased revenue …

professional
Top data and analytics risks that will concern audit executives in 2019

Risks surrounding data and analytics are the primary concerns of chief audit executives (CAEs) for 2019, according to Gartner. Based on a survey of 144 CAE clients, Gartner …

ransomware
Bitdefender releases GandCrab ransomware decryption tool

Bitdefender released a decryption tool for recent versions of GandCrab, the world’s most prolific ransomware. Developed in close partnership with Europol and the …

network
Consumer skepticism and stronger protections call for security changes

2018 became the year where protecting personal information established itself as a right that is wanted by and entitled to citizens. More people started questioning who owns …

building
Building shared digital identity using blockchain technology

I previously described challenges both consumers and organizations face when it comes to user identity and how a shared digital identity can reshape digital trust as we know …

bot
Most security professionals fear AI attacks

Neustar released the most recent International Cyber Benchmarks Index, which highlights the increased year-over-year concern around security vulnerabilities, including …

connected house
Early adopter paradox: Consumers most excited about IoT are also most aware of privacy risks

Adoption of the Internet of Things continues to explode but it could be even more transformative, a new F-Secure survey finds. The consumers most eager to purchase new …

cloud binary
Businesses shift physical security systems to the cloud to access big data insights

A new study of 1500 IT decision makers from the UK, France and Germany has found a favourable shift towards cloud, as well as a need for businesses to adopt technology to …

Don't miss

Cybersecurity news