Latest Posts
What CEOs Need to Know About the Future of Cybersecurity
February 14, 2019 Added by:Steve Durbin
CEOs need to take the lead and take stock now in order to ensure that their organizations are better prepared and engaged to deal with these ever-emerging challenges.
Comments (0)
Who’s Responsible for Your Cyber-Security?
February 12, 2019 Added by:Matt Johnson
Cyber security is everybody’s responsibility – make sure that staff have the tools, and the knowledge, to do it properly.
Comments (0)
CERT/CC Warns of Vulnerabilities in Marvell Avastar Wireless SoCs
February 08, 2019 Added by:Ionut Arghire
The CERT Coordination Center (CERT/CC) has issued a vulnerability note providing information on a series of security issues impacting Marvell Avastar wireless system on chip (SoC) models.
Comments (0)
Mozilla Concerned of Facebook’s Lack of Transparency
February 05, 2019 Added by:Ionut Arghire
Mozilla is concerned about Facebook’s lack of transparency regarding political advertising, Chief Operating Officer Denelle Dixon said last week in a letter to the European Commission.
Comments (0)
OWASP: What Are the Top 10 Threats and Why Does It Matter?
January 30, 2019 Added by:Nitzan Miron
Since the founding of the Open Web Application Security Project (OWASP) in 2001, it has become a leading resource for online security best practices.
Comments (0)
Magento Patches Command Execution, Local File Read Flaws
January 29, 2019 Added by:Ionut Arghire
Magento recently addressed two vulnerabilities that could lead to command execution and local file read, a SCRT security researcher reveals.
Comments (0)
The Biggest Security Hurdles in Your Business, and How to Overcome Them
January 23, 2019 Added by:Matt Johnson
Many organisations are still left in the dark when it comes to exactly what the most common, and pressing cyber security challenges are.
Comments (0)
Four Technologies that will Increase Cybersecurity Risk in 2019
January 17, 2019 Added by:Srinivas Mukkamala
While advances in technology provide many benefits, they also open new threat vectors and the potential for attacks that can spread quickly over connected ecosystems.
Comments (0)
Strategies for Winning the Application Security Vulnerability Arms Race
January 17, 2019 Added by:Anna Chiang
Security and development teams need to collaborate closely to ensure that enterprise web and mobile applications are free of vulnerabilities that can lead to costly data breaches.
Comments (0)
2019 Predictions: What Will Be This Year’s Big Trends in Tech?
January 16, 2019 Added by:Matt Johnson
What will 2019 bring, and how can businesses prepare themselves for the technological developments to come over the next twelve months?
Comments (0)
Taking Advantage of Network Segmentation in 2019
January 16, 2019 Added by:Reuven Harrison
Here's how organizations can get started with network segmentation – including some potential issues to plan for and successfully avoid.
Comments (0)
Why Zero Tolerance Is the Future for Phishing
January 09, 2019 Added by:Gary De Mercurio
Phishing attacks are really the ones that bring most organizations to their knees and are at the very start of some of the most devastating cyberattack
Comments (0)
Universities Beware! The Biggest Security Threats Come from Within the Network
January 08, 2019 Added by:Victor Danevich
While the latest technology streamlines processes and makes the learning experience more efficient, higher education institutions’ networks have not kept up with technology and cyber security requirements.
Comments (0)
IAST Technology Is Revolutionizing Sensitive Data Security
January 08, 2019 Added by:Asma Zubair
IAST is the most optimal way to test for application security, sensitive data leakage, and prevent breaches.
Comments (0)
New Year’s Resolution for 2019: Cybersecurity Must Be the Top Priority for the Board
January 04, 2019 Added by:Steve Durbin
Four security topics businesses should focus on in 2019.
Comments (0)
Unlocking the Power of Biometric Authentication with Behavior Analytics
January 04, 2019 Added by:Jackson Shaw
As biometrics continues to gain popularity in the authentication world, it’s important to keep in mind that multi-factor authentication is critical and behavior biometrics alone are not enough to fully protect your business.
Comments (0)
Cybercriminals Hide Malware Commands in Malicious Memes
January 03, 2019 Added by:Ionut Arghire
Trend Micro security researchers have discovered a new piece of malware that receives commands via malicious memes its operators published on Twitter.
Comments (0)
Miori IoT Botnet Targets Vulnerability in ThinkPHP
January 03, 2019 Added by:Ionut Arghire
A recent variant of the Mirai botnet is targeting a remote code execution (RCE) vulnerability in the ThinkPHP framework, Trend Micro security researchers warn.
Comments (0)
2019, The Year Ahead in Cloud Security
January 02, 2019 Added by:Peter Martini
In 2019, cloud security will confound organizations as concerns over data privacy, and the security skills gap pervade. But the cloud will come to its rescue.
Comments (0)
The End (of 2018) Is Near: Looking Back for Optimism
December 31, 2018 Added by:James Lee
While we wait to see if 2018 is a one-off or a movement, let’s look at what to expect in 2019.