Why ransomware continues to knock on healthcare’s door, enter, and create havoc
My name is Adam, and I’ve worked in the healthcare industry for over 15 years. In my current line of work, I assist healthcare facilities across the U.S. with their overall …
WordPress and Apache Struts weaponized vulnerabilities on the rise
Vulnerabilities in leading web and application frameworks, if exploited, can have devastating effects like the Equifax breach which affected 147 million people, according to …
Unplanned work makes it hard to deliver digital transformation
Time-critical, unplanned work caused by IT disruptions continues to plague enterprises around the world, leading to lost revenue, significant employee morale problems and …
Coronavirus: You don’t get a pass when it comes to cybersecurity
I was saddened to learn that two people who attended RSAC 2020 in San Francisco had subsequently tested positive for COVID-19. This virulent disease has impacted our lives …
Guide: Supplier CCPA readiness for security and IT teams
It’s important for security and IT professionals to understand how the California Consumer Privacy Act (CCPA) will affect how they do their jobs. Businesses that fail to …
Fake Covid-19 tracker app delivers ransomware, disinformation abounds
As Covid-19 spreads across the globe and countries do their best to slow down the infection rate, cybercriminals’ onslaught against worried users is getting more intense …
How organizations can maintain a third-party risk management program from day one
In this podcast recorded at RSA Conference 2020, Sean Cronin, CEO of ProcessUnity, talks about the importance of third-party risk management and how companies can get started …
Phishing is a huge concern among security decision-makers and influencers
A serious disconnect exists between how decision makers (i.e., CISOs, CIOs and CEOs), and security practitioners (i.e., IT managers and directors, security architects and …
Three actions to boost your organization’s resilience against coronavirus disruptions
With the spread of the coronavirus (COVID-19), CIOs should focus on three short-term actions to increase their organizations’ resilience against disruptions and prepare for …
Can 5G make you more vulnerable to cyberattacks?
Many enterprises and sectors are unaware of the 5G security vulnerabilities that exist today. Choice IoT says it’s critical for businesses to have a plan for discovering and …
Early investment in quantum computing could result in a competitive advantage
Improved AI capabilities, accelerated business intelligence, and increased productivity and efficiency were the top expectations of organizations currently investing in …
Week in review: Trojanized hacking tools, coronavirus scams, (IN)SECURE Magazine special issue
Here’s an overview of some of last week’s most interesting news, articles and podcasts: The haphazard response to COVID-19 demonstrates the value of enterprise …
Featured news
Resources
Don't miss
- Sensitive data of Eurail, Interrail travelers compromised in data breach
- PoC exploit for critical FortiSIEM vulnerability released (CVE-2025-64155)
- Microsoft shuts down RedVDS cybercrime subscription service tied to millions in fraud losses
- LinkedIn wants to make verification a portable trust signal
- QR codes are getting colorful, fancy, and dangerous