Please turn on your JavaScript for this page to function normally.
patch
Patch management is not just IT’s responsibility, get your whole team on board

I have been on the road for a few weeks now and surprisingly the topic of discussion has predominantly been patch management. Why is patch such a prevalent topic? Patching …

architecture
Week in review: Zip Slip, GDPR and the US, why creativity is key to security

Here’s an overview of some of last week’s most interesting news and articles: VPNFilter malware targets new devices, can deliver exploits to endpoints Cisco Talos …

Wi-Fi
Wi-Fi phishing attacks discovered around Atlanta City Hall

As Atlanta continues to fully recover from March’s ransomware attack, new evidence discovered today by Coronet reveals hundreds of active Wi-Fi phishing attacks …

USA
Shape up US businesses: GDPR will be coming stateside

Despite the significant financial penalties, US consumers have tended to look away or forgive brands in the aftermath of a breach, but recent research shows that this is no …

fire
Cryptomining malware digs into nearly 40% of organizations worldwide

Check Point published its latest Global Threat Index for May 2018, revealing that the Coinhive cryptominer impacted 22% of organizations globally – up from 16% in April, an …

DDoS
E-voting and DDoS concerns: The devil’s in the details

It’s a typical Wednesday. I’m sitting in the lounge at the Imperva office going through emails when I stumble onto a whitepaper titled Trust Implications of DDoS Protection in …

zero
Businesses should embrace AI or face stagnation

If companies fail to make artificial intelligence (AI) a core competency within the next five years, they will face either stagnation or elimination. Recent GlobalData …

social media
Would you delete your account if a social media provider misused your data?

With the Facebook scandal involving Cambridge Analytica still fresh in people’s minds, two-thirds of professionals admit they would delete their account if a social media …

architecture
Five keys to secure DevOps, cloud and IoT adoption

90 percent of enterprises are engaged with at least one next-generation technology (NGT), such as cloud, IoT, or AI, according to BeyondTrust. Yet, while enterprises are …

key
Why creativity is key to security

Similar to corporate auditors and risk and compliance managers, security teams are often viewed as a hindrance to business growth. They are deemed the killjoys of business …

tunnel
Crowdsourced security trends: Payouts to hackers increase

Bugcrowd has released the 2018 Bugcrowd State of Bug Bounty Report, which analyzes proprietary platform data collected from more than 700 crowdsourced security programs …

Photo gallery: Infosecurity Europe 2018 Expo, part 2

Infosecurity Europe 2018 is underway at Olympia, London. Here are a few photos from the expo floor. Featured companies: Bomgar, Qualys, Fidelis Cybersecurity, Cisco, Nuvias Group.

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools