Top

Tag: Security


Application security, Security

SaaS security is becoming a primary concern for businesses

September 27, 2021

Via: Help Net Security

One of the frequently touted advantages of using software-as-a-service (SaaS) solutions is their maintenance-free and supposedly inherently secure nature. These services are maintained by their providers and users do not have to worry about configuring, troubleshooting, and updating them. Things […]


Access control, Security

Did you give away your password in the comments section?

August 25, 2021

Via: Panda Security

Facebook and Instagram have been flooded with groups, pages, and profiles that post funny quizzes asking members and followers to answer questions that prompt engagement, such as how old they were for specific dates or events in their lives. Naturally, […]


Threats & Malware, Vulnerabilities

Hospitals still not protected from dangerous vulnerabilities

August 13, 2021

Via: Help Net Security

Ipsos conducted a research which examines attitudes, concerns, and impacts on medical device security as well as cybersecurity across large and midsize healthcare delivery organizations. Insights include how they correlate and diverge. Healthcare is one of the most targeted industries […]


Cloud security, Security

36% of organizations suffered a serious cloud security data leak or a breach in the past year

July 27, 2021

Via: Help Net Security

As cloud adoption accelerates and the scale of cloud environments grows, engineering and security teams say that risks—and the costs of addressing them—are increasing. The findings are part of the State of Cloud Security 2021 survey conducted by Fugue and […]


Privacy protection, Security

Data-localization policies are spreading rapidly around the world

July 26, 2021

Via: Help Net Security

The global economy increasingly depends on data flowing freely across borders, yet the number of nations with regulatory barriers preventing that from happening has nearly doubled in four years—from 35 countries in 2017 to 62 now, according to a new […]


Cyber-crime, Malware, Phishing

Are hackers getting rich by using gamers?

June 28, 2021

Via: Panda Security

Some gamers do really well, professional gamers sometimes earn millions. However, not all video game players are rich celebrity influencers. Very often, regular gamers cannot even afford to purchase the game they want to play. With no money in the […]


Network security, Security

SolarWinds, Exchange attacks revive calls for mandatory breach notification, better information sharing

May 24, 2021

Via: CSO Online

On the heels of three major cybersecurity incidents over the past six months—the SolarWinds and Microsoft Exchange supply chain attacks and the Colonial Pipeline ransomware attack—government officials and some in the private sector are reviving calls for better information sharing […]


Access control, Security

Use longitudinal learning to reduce risky user behavior

May 4, 2021

Via: Help Net Security

People ignore information that isn’t relevant to them, which is why IT and HR departments have been approaching security training incorrectly for years. Long-form, all-hands security seminar trainings have contributed to nearly daily data breaches for decades. HR and security […]


Network security, Security

Attacks on Medical Industry: ‘Global Threat to Health’

March 12, 2021

Via: SecureWorld

Cybersecurity is not just about data and network security; it’s about life security. Cyberattacks can have very personal consequences. We have seen examples of this throughout 2020 with an increase in cyberattacks targeting the healthcare sector due to the pandemic. […]


Cyber-crime, Identity theft

Fixing the Weakest Link — The Passwords — in Cybersecurity Today

March 11, 2021

Via: The Hacker News

Password security has long been an issue for businesses and their cybersecurity standards. Account passwords are often the weakest link in the overall security posture for many organizations. Many companies have used Microsoft’s default password policies for decades. While these […]