Reliability, security and QoS are critical when evaluating networking solutions providers
Reliability, security and quality of service all rank above cost when evaluating networking solutions providers. Spiceworks surveyed U.S.-based IT professionals who have …
By 2020, artificial intelligence will create more jobs than it eliminates
2020 will be a pivotal year in AI-related employment dynamics, according to Gartner, as artificial intelligence (AI) will become a positive job motivator. The number of jobs …
Taking the physician’s pulse on cybersecurity
More than four in five U.S. physicians (83 percent) have experienced some form of a cybersecurity attack, according to Accenture and the American Medical Association (AMA). …
IoT data exchange: Building trust and value
The results of Cisco’s IoT Value/Trust Paradox report show that, while most consumers believe IoT services deliver significant value for them, very few understand or …
Flaw in Office 365 with Azure AD Connect could result in domain compromise
The Preempt research team has uncovered a vulnerability with Microsoft Office 365 when integrated with an on-premises Active Directory Domain Services (AD DS) using Azure AD …
Emerging trends companies should prepare for in 2018
Today’s organizations face a cyber security landscape that is more difficult to navigate than ever before. To shed light on what lies ahead and help businesses better …
Whitepaper: Top 20 cyber attacks on ICS
This whitepaper is no longer available. The technique for evaluating the risk of cyber-sabotage of industrial processes are well understood by those skilled in the art. …
US man is behind the 2015 Hacking Team hack?
Who’s behind the 2015 Hacking Team hack? According to a notice received by Guido Landi, one of the former Hacking Team employees that was under investigation for the …
eBook: Defending against crypto-ransomware
This promotion has ended. According to the Symantec 2017 Internet Security Threat Report, the average ransom demand has reached over $1000 in the last year. Therefore, it is …
Enterprise USB security is outdated and inadequate
While USB drives are ubiquitous for employees across all industries, security policies for these devices are often severely outdated or grossly inadequate for protecting …
1.4 billion unencrypted credentials found in interactive database on the dark web
A data dump containing over 1.4 billion email addresses and clear text credentials is offered for download in an underground community forum. What’s so special about …
An analysis of 120 mobile app stores uncovers plethora of malicious apps
RiskIQ analyzed 120 mobile app stores and more than 2 billion daily scanned resources. In listing and analyzing the app stores hosting the most malicious mobile apps and the …
Featured news
Resources
Don't miss
- What Cloudflare’s 2025 internet review says about attacks, outages, and traffic shifts
- Update your Apple devices to fix actively exploited vulnerabilities! (CVE-2025-14174, CVE-2025-43529)
- Kali Linux 2025.4: New tools and “quality-of-life” improvements
- How researchers are teaching AI agents to ask for permission the right way
- Prometheus: Open-source metrics and monitoring systems and services