Most organizations have no Active Directory cyber disaster recovery plan
Although 97% of organizations said that Active Directory (AD) is mission-critical, more than half never actually tested their AD cyber disaster recovery process or do not have …
                                New AI algorithm to detect cryptocurrency miners as they steal power
Computer scientists have developed a new artificial intelligence (AI) system that may be able to identify malicious codes that hijack supercomputers to mine for cryptocurrency …
                                Three places for early warning of ransomware and breaches that aren’t the dark web
For better or worse, a lot of cybercrime sleuthing and forecasting tends to focus on various underground sites and forums across the deep and dark web corners of the Internet. …
                                ERP security: Dispelling common misconceptions
Enterprise resource planning (ERP) systems are an indispensable tool for most businesses. They allow them to track business resources and commitments in real time and to …
                                PinK: A new way of implementing a key-value store in SSDs
As web services, cloud storage, and big-data services continue expanding and finding their way into our lives, the gigantic hardware infrastructures they rely on–known …
                                New attack vectors make securing virtual companies even more challenging
As organizations are settling into long-term remote working, new attack vectors for opportunistic cyberattackers—and new challenges for network administrators have been …
                                The evolution of IoT asset tracking devices
Asset tracking is one of the highest growth application segments for the Internet of Things (IoT). According to a report by ABI Research, asset tracking device shipments will …
                                Malicious iOS SDK breaches user privacy for millions
Researchers discovered a malicious functionality within the iOS MintegralAdSDK (aka SourMint), distributed by Chinese company Mintegral. Functional flow of a user ad-click …
                                Protect your organization in the age of Magecart
The continuing wave of attacks by cybercriminal groups known under the umbrella term Magecart perfectly illustrates just how unprepared many e-commerce operations are from a …
                                COVID-19 impact on digital transformation, cloud and security strategies
Half a year into the shutdown, companies are still playing catch up to optimize their remote work experience, according to Infoblox. Survey findings are based on 1,077 …
                                How can companies avoid the risks of unexpected expenses related to cloud migration?
As companies shift to remote work and move business operations online because of the spread of COVID-19, they are increasingly relying on cloud services. Unexpected expenses …
                                Researchers develop a process to categorize massive datasets, making data more accessible
A computer science professor at The University of Texas at Arlington is working with researchers to develop a process by which data points in multiple graph layers of massive …
Featured news
Resources
Don't miss
- Cybercriminals exploit RMM tools to steal real-world cargo
 - Former ransomware negotiators allegedly targeted US firms with ALPHV/BlackCat ransomware
 - How nations build and defend their cyberspace capabilities
 - Uncovering the risks of unmanaged identities
 - Deepfakes, fraud, and the fight for trust online