Please turn on your JavaScript for this page to function normally.
The state of vulnerability management

An Edgescan report reveals that organizations are still taking nearly two months to remediate critical risk vulnerabilities, with the average mean time to remediate (MTTR) …

Small business owners concerned EV charging stations ccould be hacked

As they increasingly add electric vehicles to their service fleets, small business owners worry about cybersecurity when connecting them to public charging stations, a HSB …

Merchants spent nearly €7 billion on fraud detection and prevention in 2021: Fraud itself costs less

CMSPI reveals European merchants spent nearly €7 billion on fraud detection and prevention in 2021, which is more than three times the value lost to fraud in the same year. …

ransomware
77% of IT leaders are confident in their ability to prevent or mitigate a ransomware attack

ExtraHop’s report shows that however capable IT organizations have been in managing the dramatic transformations of the past couple of years, confidence still tends to …

Bad actors improving efforts to evade and fool both traditional and AI-based defenses

Deep Instinct Threat Research team monitored attack volumes and types to predict where the future of cybersecurity is heading, find out what motivates attackers, and to lay …

camera
Video surveillance systems market to grow steadily by 2026

The video surveillance systems market is expected to grow at a CAGR of 10.06% over the forecast period 2021 to 2026, according to ResearchAndMarkets. Commercial segment is to …

Earth
AI can alter geospatial data to create deepfake geography

A fire in Central Park seems to appear as a smoke plume and a line of flames in a satellite image. Colorful lights on Diwali night in India, seen from space, seem to show …

bot
Video: TinyNuke botnet explained

In the videos below, McAfee Labs show the setup requirements for installing and deploying TinyNuke. They review the available features of TinyNuke through the control panel, …

Laws, regulations and contracts that infosec pros should be familiar with

If you’re a white hat and you want to continue being one, knowing what laws and industry regulations allow or not allow (or require or not require) you to do is of …

Tips for evolving your office’s security culture

Changing a corporate security culture, or even just that of your own office or department, can sometimes seem impossible. In general, people don’t like change: they just …

The Release
Documentaries about an expert convicted of leaking classified information

Stephen Kim was a top level state department intelligence analyst. He went to prison under the Espionage Act. The Surrender The Surrender intimately documents Stephen Kim’s …

cloud binary
Video: Trust in the Cloud panel

Here is video recording of a “Trust in the Cloud” panel which was a part of the Rackspace::Solve NYC event held last Thursday. Rackspace Security leader David …

Don't miss

Cybersecurity news