Tag "Cyber Security"

Back to homepage
Software

Cyber threats continue to evolve, but security teams remain confident

Coming off of a year of major data breaches making headline news, it’s easy to draw the conclusion that security teams are losing the cybersecurity battle, a DomainTools survey reveals. Click here to view

Hardware/Network

Create secure IoT products: Enable security by design

Good practices for IoT security, with a particular focus on software development guidelines for secure IoT products and services throughout their lifetime have been introduced in a report by ENISA. Click here

Industry Insights

What We Can Learn From This Year’s National Cybersecurity Awareness Month

National Cybersecurity Awareness Month (NSCAM) has been an annual fixture since October 2003. The goal of the last 16 years has been to raise awareness of the importance of security

Software

Why Software Developers Are The True Cybersecurity Threat

Software exists to make things we want to repeat — in the exact same manner, time after time — easy to access. When I press the “W” key, I expect

Hardware/Network

Cyber Risk Increases at All Layers of the Corporate Network

The growing popularity of cloud and DevOps environments will continue to drive business agility while exposing organizations, from enterprises to manufacturers, to third-party risk. Click here to view original webpage at www.helpnetsecurity.com

IT Compliance

Inadequate Data Sanitization Puts Enterprises at Risk of Breaches & Compliance Failures

Global enterprises’ overconfidence and inadequate data sanitization are exposing organizations to the risk of data breach, at a time when proper data management should be at the forefront of everything they

IT Compliance

Driving Collaboration Between Security & IT Ops Teams is a Major Challenge

Strained relationships between security and IT ops teams leave businesses vulnerable to disruption, even with increased spending on IT security and management tools, a Tanium research reveals. Click here to

IT Compliance

Do Third-Party Users Follow Security Best Practices and Policies?

Many organizations across the globe fall short of effectively managing access for third-party users, exposing them to significant vulnerabilities, breaches and other security risks, One Identity reveals. Click here to view original

Software

Windows 10 Update is Packed with Dangerous Ransomware – Do Not Download!

WINDOWS 10 users are receiving emails purporting to be from Microsoft, urging them to install a new update to their machine. But be warned, it’s not an official message from

Vendor News

Microsoft rebukes rumors that Microsoft Teams is being used in ransomware attacks

In a statement published today, Microsoft has rebuffed rumors that its Microsoft Teams communication and collaboration platform is being used by cyber-criminal gangs to plant ransomware on company networks. Click