Bug in widely used bootloader opens Windows, Linux devices to persistent compromise
A vulnerability (CVE-2020-10713) in the widely used GRUB2 bootloader opens most Linux and Windows systems in use today to persistent compromise, Eclypsium researchers have …
The average total cost of a data breach declined, but costs increased for many organizations
Data breaches cost companies $3.86 million per breach on average, and compromised employee accounts are the most expensive root cause. Based on in-depth analysis of data …
Delivering and maintaining security at the speed of digital transformation
Dustin Rigg Hillard, CTO at eSentire, is responsible for leading product development and technology innovation. His vision is rooted in simplifying and accelerating the …
Things to consider when selecting enterprise SSDs for critical workloads
The process of evaluating solid state drives (SSDs) for enterprise applications can present a number of challenges. You want maximum performance for the most demanding servers …
Most consumers believe government regulation should help address privacy risks
As consumers’ concerns about their digital privacy continue to grow and who is responsible for guarding it remains unclear, new research conducted by Ponemon Institute …
Businesses are preparing for a cloud-based approach to applications
While most enterprises are committed to modernizing their application software portfolios, there are still myriad challenges to overcome and improvements to be made, according …
CloudEOS: Production multi-cloud at high scale
Arista Networks announced several additions to its multi-cloud and cloud-native software product family with CloudEOS Edge: designed to integrate with native cloud networking …
Quarterly KACE Cloud MDM release includes Windows 10 enrollment
Quest Software announced its continued evolution and advancement for Quest KACE Unified Endpoint Management (UEM). As part of UEM, KACE provides organizations the power to …
Offensive Security acquires security training project VulnHub
Offensive Security has acquired open source security training resource hub VulnHub. The acquisition is part of OffSec’s ongoing mission to provide practical training content …
(ISC)² signs up Global Knowledge as official training provider
(ISC)² announced that Global Knowledge has been added as an Official Training Provider for the UK, further expanding the range of leading training organizations offering …
Qualys acquires software assets of Spell Security
Qualys has acquired the software assets of Spell Security, an endpoint detection and response start-up. This acquisition further strengthens Qualys’ security and threat …
Qualys unveils Multi-Vector EDR, a new approach to endpoint detection and response
Qualys today announced Qualys Multi-Vector EDR. Taking a new multi-vector approach to Endpoint Detection and Response (EDR), Qualys now brings the unifying power of its highly …
Featured news
Resources
Don't miss
- How AI is reshaping attack path analysis
- What happens when cybersecurity knowledge walks out the door
- AI-driven scams are eroding trust in calls, messages, and meetings
- Ransomware group breached SmarterTools via flaw in its SmarterMail deployment
- European Commission hit by cyberattackers targeting mobile management platform