Please turn on your JavaScript for this page to function normally.
industry
A closer look at the IT/OT landscape for infosec professionals

The challenge for modern cyber security engineers working in the OT/ICS area involves modernizing the weak or missing protection controls in existing infrastructure toward …

arrow
Week in review: BA breach, Magento sites under attack

Here’s an overview of some of last week’s most interesting news and articles: How metrics can enhance the effectiveness of security programs Choosing the right …

Tor browser
Tor Browser 8 is out: What’s new?

Version 8 of Tor Browser, the multiplatform browser that routes traffic through the Tor anonymity network, has been released this week. About the Tor Browser and this latest …

Idera
New infosec products of the week​: September 7, 2018

IDERA updates toolset for SQL Server security and compliance SQL Secure and SQL Compliance Manager work together to help database administrators establish and enforce security …

British Airways
Financial info of 380,000 British Airways customers stolen in site, app breach

British Airways has suffered a data breach and has confirmed that personal and financial details of some 380,000 customers have been compromised. About the breach “From …

idea
Back to school: Lessons in endpoint security

It’s back to school season, and students, teachers and administrators are returning to campuses and classrooms. All of those students and staffers are working on desktops and …

building blocks
How metrics can enhance the effectiveness of security programs

For anyone responsible for maintaining their organization’s security posture, the findings from the SANS 2018 Security Operations Center (SOC) Survey should come as no …

Cisco
Cisco fixes a host of security holes, including latest Apache Struts flaw

Cisco has plugged a heap of security holes – three of which are critical – in a variety of its products. The critical flaws The flaws deemed critical are: A DoS …

Qualys CertView
Qualys Community Edition: Discover IT assets, manage vulnerabilities, scan web apps

In this podcast recorded at Black Hat USA 2018, Anthony Mogannam, Product Manager, SME/SMB Solutions at Qualys, talks about issues related to open source software and Qualys …

Schneider Electric Modicon M221
Remotely exploitable flaw in Schneider Electric PLCs is a danger to OT networks

A vulnerability in the Schneider Electric Modicon M221, a programmable logic controller (PLC) deployed in commercial industrial facilities worldwide, can be exploited to …

architecture
How leadership implements cyber resiliency across their organizations

A majority of executives around the world feel they face a “specialist-generalist” dilemma as to whom leads on cyber resiliency due to its critical nature across …

IoT security
IT security teams are being locked out of IoT projects

Trend Micro revealed that organizations around the world are exposing themselves to unnecessary cyber risk by failing to give IT security teams a voice when planning IoT …

Don't miss

Cybersecurity news