cybersecurity

Most attacks successfully infiltrate production environments without detection
While organizations continue to invest significant budget dollars in security controls and assume that this means assets are fully protected, the reality is that a majority of …

Software vulnerabilities sometimes first announced on social media
Software vulnerabilities are more likely to be discussed on social media before they’re revealed on a government reporting site, a practice that could pose a national …

Adult live streaming site CAM4 found leaking data of millions of users
A misconfigured database containing 7 terabytes of sensitive user and company information related to adult live streaming site CAM4 has been found leaking data. The database …

Nearly a million WordPress sites targeted in extensive attacks
A threat actor is actively trying to insert a backdoor into and compromise WordPress-based sites to redirect visitors to malvertising. “While our records show that this …

Helping healthcare combat cyber attackers
Hospitals and other healthcare organizations around the globe are under immense pressure as they test and care for patients with COVID-19. They are also under siege by cyber …

Future of work: Delivering a modern workspace
We are all painfully aware how the current climate of lockdown and working from home has focused the conversations within the technology community regarding the pros and cons …

Password psychology: People aren’t protecting themselves even though they know better
People aren’t protecting themselves from cybersecurity risks even though they know they should, a study on password psychology by LogMeIn reveals. Password psychology Year …

Sensitive data is piling up on enterprise devices, Windows 10 machines behind on patching
Directly after the WHO declared COVID-19 a global pandemic, an estimated 16 million US employees were sent home and instructed to work remotely, while governments around the …

How to prevent permission bloat: Overlooked and hidden access
When it comes to your organizational security, you should leave no stone unturned. Overlooked access rights are one of the most unnoticed security threats your organization …

Why you should be rushing to deploy multi-factor authentication to support remote work
With a third of the population currently working remotely and great uncertainty regarding when this situation is going to change, organizations must shift their business …

Half of IT pros believe their cybersecurity teams are ready to detect attacks
A surprising 51 percent of technology professionals and leaders are highly confident that their cybersecurity teams are ready to detect and respond to rising cybersecurity …

Help your helpdesk: Empower employees to self-reset their AD account password
The COVID-19 pandemic has triggered a momentous shift for many organizations: remote work has become the new normal. Businesses that were skeptical before are now being forced …
Featured news
Resources
Don't miss
- AWS Trusted Advisor flaw allowed public S3 buckets to go unflagged
- Using lightweight LLMs to cut incident response times and reduce hallucinations
- Fractional vs. full-time CISO: Finding the right fit for your company
- Product showcase: iStorage datAshur PRO+C encrypted USB flash drive
- Apple fixes zero-day vulnerability exploited in “extremely sophisticated attack” (CVE-2025-43300)