Please turn on your JavaScript for this page to function normally.
Business ideas
How to harmonize IT GRC controls in your environment

In this podcast recorded at RSA Conference 2017, Tim White, Director of Product Management, Policy Compliance at Qualys, talks about about achieving uniform compliance in risk …

world
Week in review: WhatsApp flaw, lip motion passwords, reinventing software patching

Here’s an overview of some of last week’s most interesting news, podcasts and articles: Vulnerability in WhatsApp and Telegram allowed complete account takeover …

Ubiquiti Networks NanoStation
Unpatched flaw opens Ubiquiti Networks devices to compromise

A critical vulnerability in many of Ubiquiti Networks’ networking devices can be exploited by attackers to take over control of the device and, if that device acts as a …

Fileless attack framework was used in many recent attacks

In the last month or so, a number of security companies spotted attackers targeting a variety of organizations around the world with spear-phishing emails delivering …

Intel is offering up to $30,000 for bugs in its hardware

Intel has become the latest tech company to launch a bug bounty program. Intel bug bounty program: What’s in scope and what is not Intel is looking for bug hunters to …

New infosec products of the week​: March 17, 2017

Capture, process, analyze data generated by IoT devices MapR Technologies announced MapR Edge, a small footprint edition of the MapR Converged Data Platform. Addressing the …

stats
The information security marketplace shift

In this podcast recorded at RSA Conference 2017, Garry Sidaway, SVP of Security Strategy & Alliances for NTT Security, talks about the shift in the marketplace, and how …

robot
Bad bots attack 96% of websites with login pages

Almost every website with a login page is under attack from bad bots, the automated programs used to carry out a variety of nefarious activities, according to Distil Networks. …

brain
What impact will artificial intelligence have on business?

Tata Consultancy Services polled 835 executives across 13 global industry sectors in four regions of the world, finding that 84% of companies see the use of AI as …

rings
User info of millions of Wishbone users slurped by hackers

Science Inc., the company behind the popular online poll creation app Wishbone, has suffered a data breach. As a consequence, personal and account information of over 2.2 …

lips
Lip movement: Authentication through biometrics you can change

Choosing a unique, complex and long enough password that will still be easy to remember is a big challenge for most users, and most of them would happily opt for biometric …

tech
Adoption of advanced technology continues quickly despite security gaps

93% will use sensitive data in an advanced technology (defined as cloud, SaaS, big data, IoT and container) environments this year. 63% of those also believe their …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools