Cybersecurity and ethical data management: Getting it right
Data can provide information, information can lead to insight and knowledge, and knowledge is power. It’s no wonder, then, that seemingly everybody in this modern, …
HITB Armory: Independent security researchers to showcase their tools
Organized in collaboration with Maximiliano Soler from ToolsWatch and Matteo Beccaro from Opposing Force, the HITB Armory is a brand new area of HITB2018DXB where independent …
Ransomware is the leading cyber threat experienced by SMBs
Ransomware continues to be the leading cyber attack experienced by SMBs over viruses and spyware, according to Datto. Their report surveyed 2,400 MSPs that support the IT …
Despite rise in security awareness, employees’ poor security habits are getting worse
Despite an increased focus on cybersecurity awareness in the workplace, employees’ poor cybersecurity habits are getting worse, compounded by the speed and complexity of the …
FlawedAmmy: Dangerous RAT enteres most wanted malware list
The latest Check Point Global Threat Index reveals that while cryptomining malware continues to dominate the rankings, a remote access Trojan has reached the top ten’s list …
1 in 5 merchants compromised by Magecart get reinfected
The Magecart threat looms large for online retailers and their customers, as the criminal groups that have been assigned this collective name are constantly trying out new …
HITB Security Conference to feature CTF, free to the public hacking games and challenges
In two weeks, one of the most gruelling security challenges returns to the Middle East! As part of Hack in the Box’s (HITB) return to Dubai after an 8-year gap, the HITB …
What mid-market security budgets will look like in 2019
As 2018 draws to a close, IT and security pros around the country will greet the arrival of budget season with a collective sigh. Negotiating for IT budgets at small or …
M&A transactions may be stalling due to GDPR compliance concerns
An increasing number of M&A transactions may be stalling because of concerns over GDPR compliance, according to a survey of EMEA M&A professionals conducted by …
Cyber attacks ranked as top risk in Europe, North America, East Asia and the Pacific
There are significant differences in risk perceptions across the eight regions covered in the World Economic Forum’s Regional Risks for Doing Business report. Over 12,000 …
Narrow gap between CEO, CIO and CISO roles means companies are struggling to secure digital assets
Responsibility for information security is not falling to any one senior executive function, according to the 2018 Risk:Value report from NTT Security, which surveyed 1,800 …
Consumers would stop engaging with a brand online following a breach
Ping Identity surveyed more than 3,000 people across the United States, United Kingdom, France and Germany to find out what they expect from brands when it comes to the …
Featured news
Resources
Don't miss
- Inside Microsoft’s veteran-to-tech workforce pipeline
- Brakeman: Open-source vulnerability scanner for Ruby on Rails applications
- Incident response lessons learned the hard way
- Okta users under attack: Modern phishing kits are turbocharging vishing attacks
- One-time SMS links that never expire can expose personal data for years