Please turn on your JavaScript for this page to function normally.
connection
Scaling the IoT product security lifecycle with automation

Recent events around the globe once again shine a limelight on the security issues the IoT community is facing. From claimed attacks on chlorine plants in Ukraine to potential …

password
Stringent password rules lower risk of personal data breaches

The all-too-common practice of using the same email address/password combination to log into multiple websites can be damaging, especially for employers with many users and …

corporate cloud
Week in review: Enterprise cybersecurity PKIs, keeping your cloud malware-free

Here’s an overview of some of last week’s most interesting news and articles: Researchers link Industroyer to NotPetya ESET researchers believe they have found …

arrows
PoC exploit for Windows Shell RCE released

Here’s one more reason to hurry with the implementation of the latest Microsoft patches: a PoC exploit for a remote code execution vulnerability that can be exploited …

Arcserve
New infosec products of the week​: October 12, 2018

Arcserve Business Continuity Cloud safeguards complex IT infrastructures Arcserve unveiled Arcserve Business Continuity Cloud, the fully-integrated, cloud-born solution to …

bulb
Every month should be Cyber Security Awareness Month

In 2004, October was deemed National Cyber Security Awareness Month (NCSAM). This was an initiative promoted by the National Cyber Security Division (NCSD) within the …

classroom
Securing campus networks became more challenging

The results of a global Infoblox survey on the state of network security at higher education institutions reveals that 81 percent of IT professionals believe securing campus …

money
Identity spoofing is the most prevalent attack vector for the gaming and gambling industry

A new ThreatMetrix Cybercrime Report revealed that identity spoofing, fuelled by stolen identity data, is the most prevalent attack vector for the gaming and gambling …

malware
Researchers link Industroyer to NotPetya

ESET researchers believe they have found evidence that the TeleBots APT was behind the December 2016 attacks against the Ukraine energy sector that resulted in blackouts …

Juniper Networks
Juniper fixes 30+ vulnerabilities in its routing, switching devices

Juniper Networks has issued fixes for over thirty vulnerabilities affecting its routing, switching and security products running Junos OS. Critical issues fixed CVE-2018-0044 …

binary
Your backup data sets can become a treasure trove for advanced threat detection

Despite ever increasing investments in security technologies, data breaches and cyber incidents are increasing at a relentless rate, and the problem is projected to keep …

DNS
Most Fortune 50 companies unprepared for major DNS attack

ThousandEyes has found that 68 percent of the top 50 companies on the Global Fortune 500 rankings are not adequately prepared for the next major attack on the DNS. …

Don't miss

Cybersecurity news