
Multi-stage attack techniques are making network defense difficult
IT managers are inundated with cyberattacks coming from all directions and are struggling to keep up due to a lack of security expertise, budget and up to date technology, …

How well are healthcare organizations protecting patient information?
Healthcare organizations have high levels of confidence in their cybersecurity preparedness despite most of them using only basic user authentication methods in the face of an …

CVSS 3.1: Refined and updated for easier adoption by the security community
The Forum of Incident Response and Security Teams (FIRST) has published an update of its internationally recognized Common Vulnerability Scoring System (CVSS). CVSS is a …

Only 25% of organizations using AI have an enterprise-wide AI strategy
Only 25% of global organizations that are already using artificial intelligence (AI) solutions, have developed an enterprise-wide AI strategy, according to IDC. At the same …

Week in review: Fileless malware, usable cybersecurity, Magecart goes after S3 buckets
Here’s an overview of some of last week’s most interesting news and articles: Inside the NIST team working to make cybersecurity more user-friendly Cybersecurity …

German banks to stop using SMS to deliver second authentication/verification factor
German banks are moving away from SMS-based customer authentication and transaction verification (called mTAN or SMS-TAN), as the method is deemed to be too insecure. …

New infosec products of the week: July 12, 2019
Exostar launches new SaaS-based policy management solution Exostar PolicyPro extends the company’s risk management suite by allowing organizations throughout the DoD supply …

How businesses can become more nimble and secure by moving to the cloud
Today’s business landscape is more dynamic than ever before. Organizations are being inundated with data, generated by an ever-increasing number of connected devices and …

Small and mid-sized organizations remain especially vulnerable to persistent compromises
Despite sophisticated prevention security tools, small to mid-sized organizations continue to be especially vulnerable to long lasting breaches due to their inability to …

Insights into end-user security awareness and behavior around phishing
Phishing remains a leading concern for organizations worldwide. A new Proofpoint report features analysis of data related to nearly 130 million cybersecurity questions and …

Citrix plugs critical Citrix SD-WAN flaws, patch ASAP!
Researchers have found critical vulnerabilities in Citrix SD-WAN, one of the most widely used SD-WAN solutions out there, and are urging administrators to patch them as soon …

Global IoT market projected to reach $1111.3 billion by 2026
Organizations around the world are increasingly adopting advanced technologies, which is driving the global Internet of Things (IoT) market. Fortune Business Insights in a …
Featured news
Resources
Don't miss
- Why we must go beyond tooling and CVEs to illuminate security blind spots
- Making security and development co-owners of DevSecOps
- Review: Passwork 7.0, self-hosted password manager for business
- What a mature OT security program looks like in practice
- Machine unlearning gets a practical privacy upgrade