Please turn on your JavaScript for this page to function normally.
What if defenders could see the future? Many clues are out there

Malware sophistication is increasing as adversaries begin to weaponize cloud services and evade detection through encryption, used as a tool to conceal command-and-control …

strategy
How organizations are confronting escalating third-party cyber risk

Based on in-depth interviews with security executives from 30 participating organizations across multiple industries, RiskRecon revealed how companies are managing the …

BEC scams
BEC scammers actively targeting Fortune 500 companies

Nigerian scammers are targeting Fortune 500 companies, and have already stolen millions of dollars from some of them, IBM Security researchers have found. Their strategy is …

AWS
To prevent data breaches, AWS offers S3 bucket permissions check to all users

Amazon Web Services (AWS) has announced that all customers can now freely check whether their S3 buckets are leaking stored data. “Previously available only to Business …

question
Poor communication between CEOs and technical officers leads to misalignment

A misalignment between CEOs and technical officers is weakening enterprise cybersecurity postures, according to Centrify. CEOs are incorrectly focused on malware, creating …

artificial intelligence
Afraid of AI? We should be

Not (yet!) of a sentient digital entity that could turn rogue and cause the end of mankind, but the exploitation of artificial intelligence and machine learning for nefarious …

GDPR
Whitepaper: What is GDPR and what does your organisation need to do to comply?

This whitepaper is no longer available. On May 25, the General Data Protection Regulation will bring sweeping changes to data security in the European Union. If your …

cloud complexity
Even with cloud providers implementing defenses, glaring weaknesses remain

A new report from RedLock offers a look at the threats and vulnerabilities that continue to mount in public cloud computing environments. Account compromises keep rising Poor …

dark
The advent of GDPR could fuel extortion attempts by criminals

The number of exploit kit attacks is, slowly but surely, going down, and malware peddlers are turning towards more reliable tactics such as spam, phishing, and targeting …

HITB Amsterdam
Hack In The Box announces keynote speakers for 2018 Amsterdam event

Hack In The Box Security Conference (HITBSecConf) is returning to Amsterdam in April this year with more than 70 speakers who will take to stage. This year’s marks the 9th …

healthcare
What types of hospitals experience data breaches?

An estimated 16 million patient records were stolen in the United States in 2016, and last summer the British health system was crippled by a ransomware attack. While we know …

industry
US sets up dedicated office for energy infrastructure cybersecurity

The US government is setting up a new Office of Cybersecurity, Energy Security, and Emergency Response (CESER) at the US Department of Energy. The CESER office will focus on …

Don't miss

Cybersecurity news