
Why companies shouldn’t dread the advent of GDPR
The main aim of the General Data Protection Regulation (GDPR) is to make sure that the data of EU citizens is protected, no matter where it’s held. The regulation, which will …

Fine-tuning the SOX compliance process
The annual Sarbanes-Oxley (SOX) Compliance Survey released by Protiviti reveals a new set of challenges facing public companies amid their compliance efforts. PCAOB audit …

Nmap 7.50 released: New NSE scripts, 300+ fingerprints, new Npcap
Nmap 7.50 is the first big release since last December and has hundreds of improvements. One of the things the developers have worked on recently is the Npcap packet capturing …

Cloud DLP policy violations rise as Slack, HipChat, and similar services increase in popularity
Cloud DLP policy violations in collaboration services like Slack and HipChat are on the rise, accounting for nearly 10 percent of total violations this quarter, according to …

Qualys helps federal agencies address requirements of White House EO on cybersecurity
The FedRAMP-certified Qualys Cloud Platform now supports the requirements laid out in the 2017 White House Executive Order (EO) on Strengthening the Cybersecurity of Federal …

Cross-border action dismantles network of payment card fraudsters
A successful operation that took down an international criminal network of payment card fraudsters was carried out thanks to cross-border cooperation in Europe. 31 suspects …

Poor endpoint security can cost you millions in detection, response, and wasted time
A new study reveals organizations are wasting an average of $6 million on the time to detect and contain insecure endpoints, among other staggering findings that show endpoint …

What’s an IT architect, and could you become one?
If you’re a Computer Science student or an IT professional looking for a new job that’s interesting, well paid, and for which demand is constant, you might want to …

Differences in personal security behaviors of US and UK workers
Wombat surveyed more than 2,000 working adults — 1,000 in the US and 1,000 in the UK — about cyber security topics and best practices that are fundamental to network and data …

IT professionals believe their data is safer in the cloud than on-premise
Nearly seven in 10 executives and over half of IT professionals revealed that they would prefer having a single cloud services provider handling their varied hosted …

Assess, report and remediate security-related configuration issues
Qualys announced Security Configuration Assessment (SCA), a new add-on for Vulnerability Management (VM) that provides customers cloud-based tools to automate configuration …

Two Mac malware-as-a-Service offerings uncovered
Two pieces of Mac malware – MacRansom and MacSpy – that seem to be created by the same developer are being offered for sale through two separate dark web portals. …
Featured news
Resources
Don't miss
- PoC exploit for Ivanti Endpoint Manager vulnerabilities released (CVE-2024-13159)
- Account takeover detection: There’s no single tell
- Man vs. machine: Striking the perfect balance in threat intelligence
- Misconfig Mapper: Open-source tool to uncover security misconfigurations
- Why AI deployment requires a new level of governance