How to avoid a costly enterprise ransomware infection
In most cases of human-operated ransomware attacks against enterprises, the hackers don’t trigger the malware immediately: according to FireEye researchers, in most …
Playing the infinite game with threat intelligence and cyber fusion
“We can know only that we know nothing. And that is the highest degree of human wisdom.” ― Leo Tolstoy, War and Peace. True wisdom, as Leo Tolstoy remarked, lies in …
Why ransomware continues to knock on healthcare’s door, enter, and create havoc
My name is Adam, and I’ve worked in the healthcare industry for over 15 years. In my current line of work, I assist healthcare facilities across the U.S. with their overall …
WordPress and Apache Struts weaponized vulnerabilities on the rise
Vulnerabilities in leading web and application frameworks, if exploited, can have devastating effects like the Equifax breach which affected 147 million people, according to …
Unplanned work makes it hard to deliver digital transformation
Time-critical, unplanned work caused by IT disruptions continues to plague enterprises around the world, leading to lost revenue, significant employee morale problems and …
Coronavirus: You don’t get a pass when it comes to cybersecurity
I was saddened to learn that two people who attended RSAC 2020 in San Francisco had subsequently tested positive for COVID-19. This virulent disease has impacted our lives …
Guide: Supplier CCPA readiness for security and IT teams
It’s important for security and IT professionals to understand how the California Consumer Privacy Act (CCPA) will affect how they do their jobs. Businesses that fail to …
(ISC)2 initiates search for next CEO
(ISC)2 – the world’s largest nonprofit membership association of certified cybersecurity professionals – announced that David Shearer, CISSP, the association’s …
Stellar Cyber’s new Entity Behavior Analytics app delivers unified view of all assets and their risk levels
Security provider Stellar Cyber, with the first Open-XDR security platform, announced the latest addition to its Starlight platform’s built-in App Store, a new Entity Behavior …
FiberLight chosen as the lit network service provider of choice by Nextlink Internet
FiberLight, a fiber infrastructure provider with more than 20 years of construction experience building mission-critical, high-bandwidth networks, announces that it has been …
Thales, Telstra, Microsoft and Arduino provide scalable security for connected IoT devices
Thales and Telstra, Australia’s leading telecommunications company are working with Microsoft and Arduino to pave the way for scalable security for connected IoT devices, by …
ZeroNorth raises $10M to further expand engineering, customer support and sales
ZeroNorth, the first provider of risk-based vulnerability orchestration across applications and infrastructure, announced that it raised a $10 million Series A+ funding round …
Featured news
Resources
Don't miss
- United Airlines CISO on building resilience when disruption is inevitable
- Allama: Open-source AI security automation
- State-backed phishing attacks targeting military officials and journalists on Signal
- Poland’s energy control systems were breached through exposed VPN access
- CISA orders US federal agencies to replace unsupported edge devices