cybersecurity

Most containers are running as root, which increases runtime security risk
While container usage reveals organizations are shifting left by scanning images during the build phase, DevOps teams are still leaving their environments open to attack, …

Healthcare IT teams battle with technical challenges to ensure network resilience and security
IDG surveyed IT leaders from hospitals, primary and urgent care facilities, pharmaceutical companies, and other healthcare entities. The goal was to shed light on how …

The future history of medical device cybersecurity
In 1555, Nostradamus published his famous Les Prophéties containing obfuscated prophecies for the world to come. Some believe that one of these predictions pertains to the …

Data industry trends to watch in 2021
Okera researchers revealed five pivotal data industry trends and predictions expected to emerge in 2021. “The COVID-19 pandemic forced companies across the board to accelerate …

Massive IT-employee disconnect hindering remote productivity
There’s a glaring disconnect between IT and employees that will hold organizations back from evolving with the market and embracing a long-term digital workplace that is …

SOC analysts overloaded, but role more important than ever
Organizations are spending more to account for widespread security operation center (SOC) challenges including growing security management complexity, increasing analyst …

Addressing the lack of knowledge around pen testing
The vast majority of attackers are opportunist criminals looking for easy targets to maximize their profits. If defenses are sufficiently fortified, finding a way through will …

Five emerging fraud threats facing businesses in 2021
With the growing threat of fraud fueled by the digital acceleration that took place in 2020, Experian revealed five emerging fraud threats facing businesses in 2021. The rapid …

Top videoconferencing attacks and security best practices
Videoconferencing has become a routine part of everyday life for remote workers, students, and families. Yet widespread adoption of this technology has also attracted …

Strike a chord: What cybersecurity can learn from music
I recently watched my team composing some music for a cybersecurity awareness project and using it to take an immersive Dark Web Mission Control Centre to a whole new level. …

SQL injection: The bug that seemingly can’t be squashed
If you’re in a hands-on cybersecurity role that requires some familiarity with code, chances are good that you’ve had to think about SQL injection over and over (and over) …

January 2021 Patch Tuesday forecast: New focus on security and software development
2020 is in the rearview mirror and most of us can’t get away fast enough. It was a year unlike any other, but 2021 looks to be unique as well. The year started out with …
Featured news
Resources
Don't miss
- China-linked Murky Panda targets and moves laterally through cloud services
- Five ways OSINT helps financial institutions to fight money laundering
- DevOps in the cloud and what is putting your data at risk
- Russian threat actors using old Cisco bug to target critical infrastructure orgs
- AWS Trusted Advisor flaw allowed public S3 buckets to go unflagged