Please turn on your JavaScript for this page to function normally.
Door
Backdoors inevitably create vulnerabilities that can be exploited by malicious actors

73 percent of IT security professionals believe countries with government-mandated encryption backdoors are more susceptible to nation-state attacks. The Venafi survey on …

Apache
Patched Apache flaw is a serious threat for web hosting providers

Organizations running Apache web servers are urged to implement the latest security update to fix a serious privilege escalation flaw (CVE-2019-0211) that can be triggered via …

Georgia Tech
Georgia Tech data breach: 1.3M students and staff potentially affected

The Georgia Institute of Technology, commonly referred to as Georgia Tech, has suffered yet another data breach. This time, the number of affected individuals may have reached …

architecture
To DevSecOps or not to DevSecOps?

Would your organization benefit from introducing DevSecOps? Dan Cornell, CTO of application security company Denim Group, believes that most organizations would. With one …

zero
Digital transformation goes hand-in-hand with Zero Trust security

Forward-looking organizations are investing in Zero Trust security and strong MFA, modern app development, IaaS, and digital transformation, a recently released Okta report …

ISC2 women in cybersecurity
Women are increasingly climbing the cybersecurity leadership ladder

Women now represent 24% of the cybersecurity workforce. While the stronger representation of women in the cybersecurity workforce is encouraging, challenges like wage …

IoT
Securing your home increasingly means securing all of your IoT devices

The Internet of Things explosion has proven controversial due to the insufficient security measures in many of these internet-connected devices. IoT attacks increase And a new …

risk
Current and emerging third-party cyber risk management approaches and challenges

Managing third-party cyber risk is critical for businesses, but a lack of continuous monitoring, consistent reporting, and other blind spots are creating challenges that could …

mobile user
Consumers concerned about privacy but willing to take risks for convenience

In today’s connected world, businesses are prime targets for cyber attacks and unintentional missteps can result in critical exposure of consumers’ sensitive personal …

Danger
A LockerGoga primer and decrypters for Mira and Aurora ransomwares

There’s some good news for victims of the Mira and Aurora ransomwares: free decrypters have been made available. New decrypters F-Secure has released a decrypter for …

tools
The CIO’s greatest roadblock to Agile development: Security governance

Today, the greatest roadblock CIOs face when adopting Agile development is not ‘security in general,’ but ‘security governance.’ We can define ‘security governance’ as the …

vault
Encryption deployment increases as organizations struggle to address compliance requirements

As organizations embrace the cloud and new digital initiatives such as the IoT, blockchain and digital payments the use of trusted cryptography to protect their applications …

Don't miss

Cybersecurity news