As organizations strive for a new version of business-as-usual, executives must prepare for challenges around infrastructure, varying guidelines, and balancing employee flexibility with office collaboration.
Read moreOMIGOD, an exploitable hole in Microsoft open source code!
September 16 2021Got Linux? Here's a bug you weren't expecting, in software you might not even know you have.
Read moreUnder Pressure: COVID-19 Forced Many Execs to Sideline Cybersecurity
September 16 2021CISOs are more stressed, and the fallout is increased cyber-risk. Also, budget restrictions lead to a yawning chasm between need and funding.
Read moreHow Attackers Invest in Cloud-Focused Cybercrime
September 15 2021A new study reveals an active underground market for access credentials to tens of thousands of cloud accounts and resources.
Read moreOWASP Reshuffles Its Top 10 List, Adds New Categories
September 15 2021The Open Web Application Security Project reshuffles its list of top threats, putting broken access controls and cryptographic failures at the top and creating three new risk categories.
Read moreCustomer Care Giant TTEC Hit By Ransomware?
September 15 2021TTEC, [NASDAQ: TTEC], a company used by some of the world's largest brands to help manage customer support and sales online and over the phone, is dealing with disruptions...
Read moreOMIGOD: Azure Users Warned of Critical OMI Vulnerabilities
September 15 2021Security researchers share the details of four flaws in Open Management Infrastructure, which is deployed on a large number of Linux virtual machines in Azure.
Read moreA Ransomware Recovery Plan That’s Solid Gold
September 15 2021Having a gold copy of critical data offline is essential in every organization's disaster recovery or continuity plan. Follow the 3-2-1-1 rule to secure your data.
Read moreExpressVPN Acquired By Kape Technologies for $936 Million
September 15 2021Privacy firm Kape says deal will double customer base and broaden reach into consumer VPN market
Read moreHow Your Printer Is Like Swiss Cheese
September 15 2021Follow these best practices to avoid the security holes created by these often-overlooked, but ubiquitous, devices.
Read more
Recent Comments