Please turn on your JavaScript for this page to function normally.
Linksys WRT3200ACM
New Linksys WRT3200ACM open source Wi-Fi router is optimization ready

Linksys announced the next generation of its one and only WRT router – the WRT3200ACM. It features Tri-Stream 160 technology creating the fastest Dual Band router …

face
How identity and access management is critical in the digital transformation process

Digital transformation is a top priority and source of anxiety for enterprises, but the majority of IT decision makers have not completed technology deployments to address the …

Berlin
Global cyber security leaders to gather in Berlin

A series of reports over the summer have shown not only that cybercrime is more persistent than ever, but there are also more opportunities. The growth of technology, …

Ubuntu
Ubuntu 16.10 released with hybrid cloud operations and Unity 8 developer preview

Released today, Ubuntu 16.10 comes with hybrid cloud operations, bare-metal cloud performance, the ability to lift-and-shift 80% of Linux VMs to machine containers, Kubernetes …

Laptop
Securing workspaces in a hyperconnected digital era

Enterprises that fail to offer employees a flexible, autonomous, and creative work environment are at risk of not attracting and retaining next-generation talent, according to …

biohazard
Most businesses don’t inspect cloud services for malware

The growing use of cloud services and the lack of visibility into sensitive information in the cloud can result in more damaging or costly data breaches, according to the …

burn
SSHowDowN Proxy attacks using IoT devices

Akamai’s Threat Research team has identified a recent spate of SSHowDowN Proxy attacks whereby attackers are using Internet of Things (IoT) devices to remotely generate …

patching cloud
Shadow IT intensifies cloud security risks

Lack of visibility into an organization’s use of cloud providers can lead to unauthorized access to data, improper handling and storage of data and improper data removal. As a …

Microsoft Windows
October Patch Tuesday: Changes, urgent updates and what’s coming next

The leaves aren’t the only things changing this October. Patch Tuesday is here and with it comes some interesting updates from big names in the software space. This month, …

transformation
Identity-centric security: The killer app for digital transformation

Organizations are measuring the success of IT security beyond just breaches and compliance; they now are including business performance indicators that contribute directly to …

GDPR
97 percent of companies don’t have a GDPR plan

Organizations ‒ both SMBs and large enterprises ‒ lack general awareness of the requirements of the new regulation, how to prepare for it, and the impact of non-compliance on …

mechanics
Deception mechanisms for detecting sophisticated attacks

Private information stored in document files is the most popular target for attacks coming from professional hackers, according to TopSpin Security. File traps, including …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools