Common digital transformation missteps businesses make and the keys to getting it right
Organizations have high expectations for digital transformation, but new research from SnapLogic, the leader in self-service application and data integration, has uncovered …
DJI plugs security flaws that could have enabled access to users’ data and drone images
Researchers at Check Point and DJI today shared details of a potential vulnerability that could have impacted DJI’s infrastructure. Vulnerability impact If exploited, the …
Demand for cybersecurity professionals continues to accelerate
Employer demand for cybersecurity professionals across the United State continues to accelerate, according to new data published on CyberSeek, created by CompTIA and Burning …
Five key considerations when developing a Security Operations Center
Ensuring access to a reliable feed of threat intelligence through a security operations center (SOC) is an essential element of many organization’s security strategy today. …
Data revolution backlash: Consumers prepared to take decisive action if organizations mishandle data
US consumers believe technological advancements pose a risk to their data privacy; believe it is the responsibility of organisations to make the purpose of data use clear and …
CFO: Disrupting, taking control, and turning data into value
Chief financial officers (CFOs) at banks and insurance companies are playing a growing role in digital transformation by leveraging new data and analytic technologies and by …
VirtualBox Guest-to-Host escape 0day and exploit released online
Independent vulnerability researcher Sergey Zelenyuk has made public a zero-day vulnerability he discovered in VirtualBox, the popular open source virtualization software …
Attackers breached Statcounter to steal cryptocurrency from gate.io users
Web analytics company Statcounter and cryptocurrency exchange gate.io have been compromised in another supply-chain attack, which resulted in an unknown number of gate.io …
HITB partners with BSides Dubai for free CommSec Track at HITB2018DXB
The HITB CommSec (community + security) track is a free-to-attend session with 30 and 60 minutes talks held during the 27th and 28th alongside the HITB2018DXB’s Exhibition. …
DevOps and security: How to make disjointed security and DevOps teams work effectively
As organizations build their “software factories”, leveraging the latest DevOps organizational models and CD/CI techniques to get applications out quickly, they still find …
How task management and easy collaboration can help your security team
Many individuals struggle with organizing their day-to-day work. In instances where they are expected to perform many disparate tasks, disorganization could end up being fatal …
Consumers can’t shake risky security habits
Despite almost half of U.S. consumers (49 percent) believing their security habits make them vulnerable to information fraud or identity theft, 51 percent admit to reusing …
Featured news
Resources
Don't miss
- Black Friday 2025 cybersecurity deals to explore
- Quantum encryption is pushing satellite hardware to its limits
- cnspec: Open-source, cloud-native security and policy project
- The privacy tension driving the medical data shift nobody wants to talk about
- Salesforce Gainsight compromise: Early findings and customer guidance