Latest Posts
Mozilla Concerned of Facebook’s Lack of Transparency
February 05, 2019 Added by:Ionut Arghire
Mozilla is concerned about Facebook’s lack of transparency regarding political advertising, Chief Operating Officer Denelle Dixon said last week in a letter to the European Commission.
Comments (0)
OWASP: What Are the Top 10 Threats and Why Does It Matter?
January 30, 2019 Added by:Nitzan Miron
Since the founding of the Open Web Application Security Project (OWASP) in 2001, it has become a leading resource for online security best practices.
Comments (0)
Magento Patches Command Execution, Local File Read Flaws
January 29, 2019 Added by:Ionut Arghire
Magento recently addressed two vulnerabilities that could lead to command execution and local file read, a SCRT security researcher reveals.
Comments (0)
The Biggest Security Hurdles in Your Business, and How to Overcome Them
January 23, 2019 Added by:Matt Johnson
Many organisations are still left in the dark when it comes to exactly what the most common, and pressing cyber security challenges are.
Comments (0)
Four Technologies that will Increase Cybersecurity Risk in 2019
January 17, 2019 Added by:Srinivas Mukkamala
While advances in technology provide many benefits, they also open new threat vectors and the potential for attacks that can spread quickly over connected ecosystems.
Comments (0)
Strategies for Winning the Application Security Vulnerability Arms Race
January 17, 2019 Added by:Anna Chiang
Security and development teams need to collaborate closely to ensure that enterprise web and mobile applications are free of vulnerabilities that can lead to costly data breaches.
Comments (0)
2019 Predictions: What Will Be This Year’s Big Trends in Tech?
January 16, 2019 Added by:Matt Johnson
What will 2019 bring, and how can businesses prepare themselves for the technological developments to come over the next twelve months?
Comments (0)
Taking Advantage of Network Segmentation in 2019
January 16, 2019 Added by:Reuven Harrison
Here's how organizations can get started with network segmentation – including some potential issues to plan for and successfully avoid.
Comments (0)
Why Zero Tolerance Is the Future for Phishing
January 09, 2019 Added by:Gary De Mercurio
Phishing attacks are really the ones that bring most organizations to their knees and are at the very start of some of the most devastating cyberattack
Comments (0)
Universities Beware! The Biggest Security Threats Come from Within the Network
January 08, 2019 Added by:Victor Danevich
While the latest technology streamlines processes and makes the learning experience more efficient, higher education institutions’ networks have not kept up with technology and cyber security requirements.
Comments (0)
IAST Technology Is Revolutionizing Sensitive Data Security
January 08, 2019 Added by:Asma Zubair
IAST is the most optimal way to test for application security, sensitive data leakage, and prevent breaches.
Comments (0)
New Year’s Resolution for 2019: Cybersecurity Must Be the Top Priority for the Board
January 04, 2019 Added by:Steve Durbin
Four security topics businesses should focus on in 2019.
Comments (0)
Unlocking the Power of Biometric Authentication with Behavior Analytics
January 04, 2019 Added by:Jackson Shaw
As biometrics continues to gain popularity in the authentication world, it’s important to keep in mind that multi-factor authentication is critical and behavior biometrics alone are not enough to fully protect your business.
Comments (0)
Cybercriminals Hide Malware Commands in Malicious Memes
January 03, 2019 Added by:Ionut Arghire
Trend Micro security researchers have discovered a new piece of malware that receives commands via malicious memes its operators published on Twitter.
Comments (0)
Miori IoT Botnet Targets Vulnerability in ThinkPHP
January 03, 2019 Added by:Ionut Arghire
A recent variant of the Mirai botnet is targeting a remote code execution (RCE) vulnerability in the ThinkPHP framework, Trend Micro security researchers warn.
Comments (0)
2019, The Year Ahead in Cloud Security
January 02, 2019 Added by:Peter Martini
In 2019, cloud security will confound organizations as concerns over data privacy, and the security skills gap pervade. But the cloud will come to its rescue.
Comments (0)
The End (of 2018) Is Near: Looking Back for Optimism
December 31, 2018 Added by:James Lee
While we wait to see if 2018 is a one-off or a movement, let’s look at what to expect in 2019.
Comments (0)
IT security Predictions for 2019 – Verifying Trust
December 19, 2018 Added by:Scott Gordon
With moves towards Hybrid IT adoption showing no signs of slowing down, 2019 will be the year when Zero Trust and Software Defined Perimeter take shape!
Comments (0)
Vote for Blockchain [Voting]
December 19, 2018 Added by:George Levy
The current voting system is ripe for change and blockchain will likely play a large role in the evolution of our electoral processes.
Comments (0)
Conflicted External Auditors at Heart of Equifax Data Breach
December 13, 2018 Added by:Christopher Paris
Equifax hired financial auditors and IT security auditors from different divisions of Ernst & Young, creating conflicts of interest that may have disincentivized both auditing teams from reporting problems that eventually led to the company’s 2017 data breach.