The state of vulnerability management
An Edgescan report reveals that organizations are still taking nearly two months to remediate critical risk vulnerabilities, with the average mean time to remediate (MTTR) …
Small business owners concerned EV charging stations ccould be hacked
As they increasingly add electric vehicles to their service fleets, small business owners worry about cybersecurity when connecting them to public charging stations, a HSB …
Merchants spent nearly €7 billion on fraud detection and prevention in 2021: Fraud itself costs less
CMSPI reveals European merchants spent nearly €7 billion on fraud detection and prevention in 2021, which is more than three times the value lost to fraud in the same year. …
77% of IT leaders are confident in their ability to prevent or mitigate a ransomware attack
ExtraHop’s report shows that however capable IT organizations have been in managing the dramatic transformations of the past couple of years, confidence still tends to …
Bad actors improving efforts to evade and fool both traditional and AI-based defenses
Deep Instinct Threat Research team monitored attack volumes and types to predict where the future of cybersecurity is heading, find out what motivates attackers, and to lay …
Video surveillance systems market to grow steadily by 2026
The video surveillance systems market is expected to grow at a CAGR of 10.06% over the forecast period 2021 to 2026, according to ResearchAndMarkets. Commercial segment is to …
AI can alter geospatial data to create deepfake geography
A fire in Central Park seems to appear as a smoke plume and a line of flames in a satellite image. Colorful lights on Diwali night in India, seen from space, seem to show …
Video: TinyNuke botnet explained
In the videos below, McAfee Labs show the setup requirements for installing and deploying TinyNuke. They review the available features of TinyNuke through the control panel, …
Laws, regulations and contracts that infosec pros should be familiar with
If you’re a white hat and you want to continue being one, knowing what laws and industry regulations allow or not allow (or require or not require) you to do is of …
Tips for evolving your office’s security culture
Changing a corporate security culture, or even just that of your own office or department, can sometimes seem impossible. In general, people don’t like change: they just …
Documentaries about an expert convicted of leaking classified information
Stephen Kim was a top level state department intelligence analyst. He went to prison under the Espionage Act. The Surrender The Surrender intimately documents Stephen Kim’s …
Video: Trust in the Cloud panel
Here is video recording of a “Trust in the Cloud” panel which was a part of the Rackspace::Solve NYC event held last Thursday. Rackspace Security leader David …
Featured news
Sponsored
Don't miss
- Organizations struggle to defend against ransomware
- Critical Git vulnerability allows RCE when cloning repositories with submodules (CVE-2024-32002)
- Google fixes third exploited Chrome zero-day in a week (CVE-2024-4947)
- Is an open-source AI vulnerability next?
- OWASP dep-scan: Open-source security and risk audit tool