cybersecurity

July 2020 Patch Tuesday forecast: Will the CVE trend continue?
Microsoft has averaged roughly 90 common vulnerabilities and exposures (CVE) fixes per month over the past five months. With everyone working from home and apparently focused …

An effective cloud security posture begins with these three steps
Public cloud adoption continues to surge, with roughly 83% of all enterprise workloads expected to be in the cloud by the end of the year. The added flexibility and lower …

USB storage devices: Convenient security nightmares
There’s no denying the convenience of USB media. From hard drives and flash drives to a wide range of other devices, they offer a fast, simple way to transport, share and …

Three major gaps in the Cyberspace Solarium Commission’s report that need to be addressed
Released in March 2020, the Cyberspace Solarium Commission’s report urges for the U.S. government and private sector to adopt a “new, strategic approach to cybersecurity,” …

70% of organizations experienced a public cloud security incident in the last year
70% of organizations experienced a public cloud security incident in the last year – including ransomware and other malware (50%), exposed data (29%), compromised accounts …

In the age of disruption, comprehensive network visibility is key
IT teams require comprehensive visibility into the network driven by a number of factors, including tremendous disruption from the COVID-19 pandemic, relentless technological …

BYOD adoption is growing rapidly, but security is lagging
As the shift to remote work has increased, most businesses are embracing BYOD in the workplace. In a survey by Bitglass, 69% of respondents said that employees at their …

How do I select an application security testing solution for my business?
Software-related issues continue to plague organizations of all sizes, so IT leaders are turning to application security testing tools for help. Since there are many types of …

Tech businesses must rethink their IT infrastructure
Working life has changed drastically in recent months. Speedy digital transformation has been critical for business continuity and has been driving growth even during these …

MongoDB is subject to continual attacks when exposed to the internet
On average, an exposed Mongo database is breached within 13 hours of being connected to the internet. The fastest breach recorded was carried out 9 minutes after the database …

Exposing the privacy risks of home security cameras
An international study has used data from a major provider of home IP security cameras to evaluate potential privacy risks for users. Privacy-compromising information IP home …

Better cybersecurity hinges on understanding actual risks and addressing the right problems
SANS Technology Institute’s Internet Storm Center (ISC) has been a valuable warning service and source of critical cyber threat information to internet users, …