Please turn on your JavaScript for this page to function normally.
binary
Cyber risk management and return on deception investment

This article is fifth in a five-part series being developed by Dr. Edward Amoroso in conjunction with the deception technology team from Attivo Networks. The article provides …

F5 report
How IT organizations are transforming to meet the demands of the digital economy

The 2019 State of Application Services report from F5 Networks showed that organizations regard application services as vital for cloud adoption and, ultimately, for success …

numbers
Encryption is key to protecting information as it travels outside the network

A new Vera report reveals stark numbers behind the mounting toll of data breaches triggered by cybercrime and accidents. One of the most recognized and mandated security …

Fortnite
Fortnite vulnerabilities would have allowed attackers to intercept and steal login credentials

Researchers at Check Point today shared details of vulnerabilities that could have affected any player of the hugely popular online battle game, Fortnite. Vulnerability impact …

cybercrime
The costs of cyberattacks increased 52% to $1.1 million

Radware has released its 2018-2019 Global Application and Network Security Report, in which survey respondents estimate the average cost of a cyberattack at $1.1M. For those …

IoT
Companies still struggle to detect IoT device breaches

Only 48% of businesses can detect if any of their IoT devices suffers a breach, according to Gemalto. This comes despite companies having an increased focus on IoT security: …

Trend Micro
Radio frequency remote controller weaknesses have serious safety implications

Trend Micro released a new report detailing inherent flaws and new vulnerabilities in radio frequency (RF) remote controllers found and disclosed through the Zero Day …

CISO
How to build a better CISO

The technology industry has long been categorized by its ability to transform at the blink of an eye. If you think back 20 years, the internet was just picking up consumer …

Windows
43% of businesses are still running Windows 7, security threats remain

With one year to go until Microsoft ends support for its ten-year-old operating system Windows 7, as many as 43% of enterprises are still running the outdated platform. …

architecture
90% of companies face significant obstacles with digital transformation

Nearly eight in 10 (79 percent) companies are in the process of digital transformation, but the vast majority, 90 percent, are facing significant obstacles to success. The new …

binary bomb
SmokeLoader malware downloader enters list of most wanted malware

Check Point has published its latest Global Threat Index for December 2018. The index reveals that SmokeLoader, a second-stage downloader known to researchers since 2011, rose …

Network
Considering an SD-WAN deployment? The best solution may already be in your network

When the internet goes down, business stops. Every business today relies on cloud applications to run day-to-day operations, including CRM applications like Salesforce, …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools