
Will Zoom manage to retain security-conscious customers?
While Zoom Video Communications is trying to change the public’s rightful perception that, at least until a few weeks ago, Zoom security and privacy were low on their …

VMware plugs critical flaw in vCenter Server, patch ASAP!
VMware has fixed a critical vulnerability (CVE-2020-3952) affecting vCenter Server, which can be exploited to extract highly sensitive information that could be used to …

The dangers of assumptions in security
Assuming things is bad for your security posture. You are leaving yourself vulnerable when you assume what you have is what you need, or what you have is working as …

GDPR, CCPA and beyond: How synthetic data can reduce the scope of stringent regulations
As many organizations are still discovering, compliance is complicated. Stringent regulations, like the GDPR and the CCPA, require multiple steps from numerous departments …

Shift to work-from-home: Most IT pros worried about cloud security
As most companies make the rapid shift to work-from-home to stem the spread of COVID-19, a significant percentage of IT and cloud professionals are concerned about maintaining …

A worrisome increase in call traffic from fraudsters exploiting the pandemic
There’s a worrisome increase in call traffic from bad actors looking to cash in on new vulnerabilities created by the global COVID-19 pandemic, according to research …

New lower pricing for CISSP, CCSP and SSCP online instructor-led training
Whether you’re studying for the CISSP, CCSP, SSCP or another industry leading (ISC)² certification, (ISC)² is here to help you stay on track to certification with our Official …

When your laptop is your workspace, the real office never closes
With the COVID-19 pandemic, working from home has moved from a company perk to a hard requirement. Social distancing government mandates have forced complete office closures …

Small businesses unprepared for remote working, most don’t provide cybersecurity training
Stay-at-home orders for more than 40 states have forced millions of businesses to establish remote workforces that rely solely on internet-enabled applications and products to …

You have to consider cybersecurity at all points of a cloud migration
Human error and complex cloud deployments open the door to a wide range of cyber threats, according to Trend Micro. Cloud security issues Gartner predicts that by 2021, over …

Week in review: TLS 1.3, full-time bug hunting, vulnerable MS Exchange servers abound
Here’s an overview of some of last week’s most interesting news, articles and podcasts: TLS 1.3: Slow adoption of stronger web encryption is empowering the bad …

Beware of fake COVID-19-themed emails from President Trump
As US citizens wait for President Trump’s final decision about whether quarantine will be over by Easter, malware peddlers have already “decided”: quarantine …
Featured news
Resources
Don't miss
- Unpatched Windows Server vulnerability allows full domain compromise
- Signal blocks Microsoft Recall from screenshotting conversations
- The hidden gaps in your asset inventory, and how to close them
- CTM360 report: Ransomware exploits trust more than tech
- Lumma Stealer Malware-as-a-Service operation disrupted