
Infosec weakest links: Negligent employees and poor password policies
54% of respondents to a Ponemon Institute study that involved more than 1,000 IT professionals said negligent employees were the root cause of a data breach. Password …

A clearer picture of the CCleaner backdoor incident
On Monday, Cisco and Piriform – the Avast-owned company behind the popular CCleaner utility – announced that certain versions of the software have been backdoored …

Digital future: Are we ready for what’s next?
The Internet Society (ISOC), a global non-profit dedicated to ensuring the open development, evolution and use of the Internet, released “Paths to our Digital …

Addressing security concerns around connected ecosystems
The convergence of IoT applications with emerging technologies such as artificial intelligence, Big Data, and context-aware computing could help address current security …

Worldwide security appliance revenue increased to $3 billion
According to IDC, the total security appliance market saw positive growth in both vendor revenue and unit shipments for the second quarter of 2017 (2Q17). Worldwide vendor …

Cybercriminals deploying assortment of banking Trojans and ransomware
Check Point revealed that banking trojans were extensively used by cybercriminals during August, with three variants appearing in the company’s latest Global Threat Impact …

Hackers backdoored CCleaner, likely affecting millions of users
Legitimately signed but backdoored versions of the popular CCleaner utility were available for download from the developer’s Web site and servers for nearly a month, …

Netdata: Distributed real-time performance and health monitoring
Netdata is a system for distributed real-time performance and health monitoring. It provides real-time insight of everything happening on the system it runs (including …

Apple’s Face ID can be quickly disabled in an emergency
A week ago, Apple debuted iPhone X and Face ID, a new biometric security mechanism that replaces Touch ID. Face ID allows users to unlock their iPhone with their face. The …

Most cloud services still not GDPR-ready
With the compliance deadline for the GDPR fast approaching in May 2018, a new Netskope report took a close look at GDPR readiness among enterprise cloud services, finding …

Week in review: Dangerous Bluetooth, EU cybersecurity certification, how Equifax hackers got in
Here’s an overview of some of last week’s most interesting news, articles and podcasts: Equifax breach happened because of a missed patch The attackers who …

Microsoft Azure confidential computing keeps data in use secret
Microsoft has announced a new Azure (cloud) data security capability: confidential computing. Who’s it for? The capability allows companies to use the cloud even if they …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility