Tag "Security Vulnerability"

Back to homepage
Software

Employees know vulnerabilities exist, but they can’t resolve them quickly enough

There is a sharp remediation gap between when organizations first detect vulnerabilities and when those issues are ultimately resolved, Adaptiva survey reveals.The survey also found that companies overwhelmingly do not

Vendor News

UK AND US SIGN LANDMARK DATA ACCESS AGREEMENT

Home Secretary Priti Patel last night signed a historic agreement that will enable British law enforcement agencies to directly demand electronic data relating to terrorists, child sexual abusers and other

Identity Theft

Majority of 2019 breaches were the result of unapplied security patches

Despite a 24% average increase in annual spending on prevention, detection and remediation in 2019 compared with 2018, patching is delayed an average of 12 days due to data silos

Identity Theft

Employees are mistakenly confident that they can spot phishing emails

While a majority (79%) of people say they are able to distinguish a phishing message from a genuine one, nearly half (49%) also admit to having clicked on a link

Hardware/Network

Avoid Bad Security Buying Decisions

Remaining competitive means staying abreast of—and even ahead of—the latest technologies that empower business. As the network expands and creates new and greater vulnerabilities, organizations know they need to enhance

Mobile

Simjacker vulnerability actively exploited to track, spy on mobile phone owners

Following extensive research, Adaptive Mobile Security has uncovered a new and previously undetected vulnerability. This vulnerability is currently being exploited and is being used for targeted surveillance of mobile phone

Industry Insights

Crowdsourced Security is Redefining the Gig Economy, and Not in a Good Way

Let’s pretend you have offensive security skills and you want to use them for gainful employment. You attend a job interview and you listen to the benefits of what this

Hardware/Network

EFFECTIVE CYBERSECURITY CAN HELP IN ACCELERATING BUSINESS TRANSFORMATION

Across the digitally inter-connected world, we are globally witnessing a rapid change in technology resulting in a tectonic shift in the way man and machine interact with one another. Along

Software

Black Hat 2019: Bounties, Breaches and Deepfakes, Oh My!

Black Hat 2019 recently wrapped in Las Vegas, where somewhere between 15,000 and 20,000 experts descended to experience the latest developments in the world of cybersecurity. While we saw the

Software

Link between personality type and vulnerabilities to cybercrime

Only four in 10 (42%) businesses focus on compliance training as part of their cybersecurity protocol to ensure sensitive data is kept secure, reports ESET. More worryingly, 63% rely predominantly