
The evolving role of the CTO
Since spending more time at home, my appetite for reading has increased. In fact, I recently picked up again one of my favorites – J. R. R. Tolkein’s Lord of the Rings …

Product showcase: Specops Password Auditor
They are often the target of many attackers who search for them like gold. Some can be easily found, while others can be more difficult to come by. However, inevitably, they …

Guide: Security measures for IoT product development
The European Union Agency for Cybersecurity (ENISA) released its Guidelines for Securing the IoT, which covers the entire IoT supply chain – hardware, software and services. …

Most UK businesses using Oracle E-Business Suite are running old systems
The majority of UK businesses using Oracle E-Business Suite (EBS) are running on old versions of the business critical ERP system, according to a Claremont study. Of the 154 …

What’s stopping job seekers from considering a career in cybersecurity?
The cybersecurity industry no longer has an image problem, but many things are still stopping individuals from considering a career in cybersecurity: a high cost of entry (the …

End-to-end encrypted communication mitigates enterprise security risk and ensures compliance
It is a mathematical certainty that data is more protected by communication products that provide end-to-end encryption (E2EE). Yet, many CISOs are required to prioritize …

Every employee has a cybersecurity blind spot
80% of companies say that an increased cybersecurity risk caused by human factors has posed a challenge during the COVID-19 pandemic, particularly in times of heightened …

Exploring the progress organizations are making in their investments towards digital resiliency
Overall investments in digital resiliency have increased steadily throughout the year as businesses prioritize or accelerate adoption of cloud, collaborative, and digital …

Developing a quantum network that exchanges information across long distances by using photons
Researchers at the University of Rochester and Cornell University have taken an important step toward developing a communications network that exchanges information across …

Week in review: Windows zero-day exploited, Patch Tuesday forecast, selecting a compliance solution
Here’s an overview of some of last week’s most interesting news, reviews and articles: Git LFS vulnerability allows attackers to compromise targets’ Windows …

Quantum computers: How to prepare for this great threat to information security
The race is on to build the world’s first reliable and truly useful quantum computer, and the finish line is closer than you might think – we might even reach it this …

New infosec products of the week: November 6, 2020
Qualys Container Runtime Security: Defense for containerized applications Qualys Runtime Container Security, once instrumented in the image, will work within each container …
Featured news
Resources
Don't miss
- Critical Wing FTP Server vulnerability exploited in the wild (CVE-2025-47812)
- Where policy meets profit: Navigating the new frontier of defense tech startups
- Four arrested in connection with M&S, Co-op ransomware attacks
- Ruckus network management solutions riddled with unpatched vulnerabilities
- What EU’s PQC roadmap means on the ground