June 14, 2022
Via: Natalie DunnWith cyberattacks on the rise, it’s more vital than ever for organizations to be able to test the strength of their systems. A penetration test or “pentest” is an efficient process when it comes to identifying and exploiting vulnerabilities within […]
April 20, 2022
Via: Nakisani JacobsToday’s businesses, regardless of size, are vulnerable to hacking and data theft, which can result in significant financial loss. A virtual private network (VPN) uses advanced technology to protect your business data and keep you safe from online threats. A […]
February 21, 2022
Via: Natalie DunnIn the last few years, two definitions gave entrepreneurs and business managers headaches: security and data protection. There is no security without data protection and no data protection without security. Here’s why these two definitions should always go together. Living […]
February 2, 2022
Via: Computer WeeklyThe human firewall is a critical element in the ongoing – and many would say escalating – fight against cyber criminals. Building one is dependent on several elements, but it starts with a robust programme for IT security awareness training. […]
February 2, 2022
Via: Radware BlogInitially, the use of Wi-Fi networks in companies was restricted to providing convenient Internet access at halls or conference rooms. In such an application, the performance was quite suitable and took a secondary place in an IT infrastructure. However, literally […]
Threats & Malware, Vulnerabilities
January 26, 2022
Via: The RegisterA security bod scored a $100,500 bug bounty from Apple after discovering a vulnerability in Safari on macOS that could have been exploited by a malicious website to potentially access victims’ logged-in online accounts – and even their webcams. Ryan […]
December 17, 2021
Via: Help Net SecurityFugue announced a cloud security platform that enables enterprises to establish centralized security visibility and governance over their cloud environments, while empowering individual business units with the flexibility they need to innovate and compete. Now, Fugue Organization Management operationalizes cloud […]
December 17, 2021
Via: Help Net SecurityScience Applications International Corp (SAIC) launched Rugged Apps, which provides government customers with highly secure versions of commercial mobile applications and software scanning services for apps. Rugged Apps fortifies mobile applications by ensuring they are National Information Assurance Partnership (NIAP) […]
December 16, 2021
Via: Help Net SecurityStratodesk released Stratodesk NoTouch Long Term Support (LTS), delivering security and Day One updates including the features enterprises need within their secure digital perimeter to ensure ongoing productivity without the need for full production approval testing. “Stratodesk NoTouch LTS allows […]
December 16, 2021
Via: Help Net SecurityThere’s a significant interest in private 5G networks, with 90% of executives expecting that private 5G will become the standard network choice, according to an Economist Impact survey. Where is private 5G being deployed? The research shows that 51% of […]
Threats & Malware, Vulnerabilities
December 14, 2021
Via: Help Net SecurityIn this interview with Help Net Security, Laura Hoffner, Chief of Staff at Concentric, talks about modern car vulnerabilities, the techniques hackers are using to compromise connected vehicles and how to protect users. Cars are becoming increasingly smart and an […]
Application security, Security
September 27, 2021
Via: Help Net SecurityOne of the frequently touted advantages of using software-as-a-service (SaaS) solutions is their maintenance-free and supposedly inherently secure nature. These services are maintained by their providers and users do not have to worry about configuring, troubleshooting, and updating them. Things […]
August 25, 2021
Via: Panda SecurityFacebook and Instagram have been flooded with groups, pages, and profiles that post funny quizzes asking members and followers to answer questions that prompt engagement, such as how old they were for specific dates or events in their lives. Naturally, […]
Threats & Malware, Vulnerabilities
August 13, 2021
Via: Help Net SecurityIpsos conducted a research which examines attitudes, concerns, and impacts on medical device security as well as cybersecurity across large and midsize healthcare delivery organizations. Insights include how they correlate and diverge. Healthcare is one of the most targeted industries […]
July 27, 2021
Via: Help Net SecurityAs cloud adoption accelerates and the scale of cloud environments grows, engineering and security teams say that risks—and the costs of addressing them—are increasing. The findings are part of the State of Cloud Security 2021 survey conducted by Fugue and […]
July 26, 2021
Via: Help Net SecurityThe global economy increasingly depends on data flowing freely across borders, yet the number of nations with regulatory barriers preventing that from happening has nearly doubled in four years—from 35 countries in 2017 to 62 now, according to a new […]
Cyber-crime, Malware, Phishing
June 28, 2021
Via: Panda SecuritySome gamers do really well, professional gamers sometimes earn millions. However, not all video game players are rich celebrity influencers. Very often, regular gamers cannot even afford to purchase the game they want to play. With no money in the […]
May 24, 2021
Via: CSO OnlineOn the heels of three major cybersecurity incidents over the past six months—the SolarWinds and Microsoft Exchange supply chain attacks and the Colonial Pipeline ransomware attack—government officials and some in the private sector are reviving calls for better information sharing […]
May 4, 2021
Via: Help Net SecurityPeople ignore information that isn’t relevant to them, which is why IT and HR departments have been approaching security training incorrectly for years. Long-form, all-hands security seminar trainings have contributed to nearly daily data breaches for decades. HR and security […]
March 12, 2021
Via: SecureWorldCybersecurity is not just about data and network security; it’s about life security. Cyberattacks can have very personal consequences. We have seen examples of this throughout 2020 with an increase in cyberattacks targeting the healthcare sector due to the pandemic. […]