Please turn on your JavaScript for this page to function normally.
ICS
Most ICS vulnerabilities disclosed this year can be exploited remotely

More than 70% of ICS vulnerabilities disclosed in the first half of 2020 can be exploited remotely, highlighting the importance of protecting internet-facing ICS devices and …

ISO
Thousands of ISO certifications at risk of lapsing due to halted re-certification audits

Thousands of valuable ISO management system certifications earned by UK companies may now be at risk because auditors from Certification Bodies may not have been able to …

Kali Linux 2020.3
Kali Linux 2020.3 released: A new shell and a Bluetooth Arsenal for NetHunter

Offensive Security has released Kali Linux 2020.3, the latest iteration of the popular open source penetration testing platform. You can download it or upgrade to it. Kali …

FIDO
Five ways to maximize FIDO

Perform a quick Google search for “causes of data breaches”, and you will be inundated with reports of stolen credentials and weak passwords. Organizations can spend billions …

identity
The benefits of providing employees with an identity compromise solution

Employees find significant value in having access to an identity compromise solution, having an available remediation solution creates a better mindset for those that use it, …

telehealth
Telehealth is the future of healthcare, but how secure is it?

54 percent of Americans have opted for virtual visits during pandemic, a CynergisTek survey reveals. Of those, more than 70 percent of respondents plan to continue to use …

cloud
Large-scale migrations away from on-premise environments are underway

COVID-19 has had a massive effect on DevOps, leading to large-scale migrations away from on-premises environments, a Codefresh survey reveals. At the same time, DevOps …

gap
Publicly reported data breaches down 52%, exposed records way up!

Although the number of publicly reported data breaches stands at its lowest in five years, the number of records exposed is more than four times higher than any previously …

businessman
3 tips to increase speed and minimize risk when making IT decisions

There is nothing like a crisis to create a sense of urgency and spawn actions. This is especially true for enterprise IT teams, who are tasked with new responsibilities and …

CEO
Internal audit leaders should develop new skills to stay relevant

Chief audit executives (CAEs) and internal audit leaders report their next-generation competency levels in three vital areas – governance, methodology and enabling technology …

healthcare
Healthcare breaches declined sharply during the first half of 2020

This has been a very challenging year. Despite the COVID-19 outbreak starting in the first half of 2020, data analyzed from the Health and Human Services (HHS) Office for …

US Army
Army researchers awarded patent for secure comms

Army researchers have been awarded a patent for inventing a practical method for Army wireless devices to covertly authenticate and communicate. Photo by Jason Edwards …

Don't miss

Cybersecurity news