Advertisement
Top

Tag: Security


Editorial

Top 10 Pentesting Tools Used by Security Professionals and Ethical Hackers

June 14, 2022

Via: Natalie Dunn

With cyberattacks on the rise, it’s more vital than ever for organizations to be able to test the strength of their systems. A penetration test or “pentest” is an efficient process when it comes to identifying and exploiting vulnerabilities within […]


Editorial

Why Your Business Needs A VPN

April 20, 2022

Via: Nakisani Jacobs

Today’s businesses, regardless of size, are vulnerable to hacking and data theft, which can result in significant financial loss. A virtual private network (VPN) uses advanced technology to protect your business data and keep you safe from online threats. A […]


Editorial

There is No Security Without Data Protection and No Data Protection Without Security

February 21, 2022

Via: Natalie Dunn

In the last few years, two definitions gave entrepreneurs and business managers headaches: security and data protection. There is no security without data protection and no data protection without security. Here’s why these two definitions should always go together.     Living […]


Network security, Security

Security Think Tank: How to build a human firewall

February 2, 2022

Via: Computer Weekly

The human firewall is a critical element in the ongoing – and many would say escalating – fight against cyber criminals. Building one is dependent on several elements, but it starts with a robust programme for IT security awareness training. […]


Network security, Security

How to protect a corporate Wi-Fi network

February 2, 2022

Via: Radware Blog

Initially, the use of Wi-Fi networks in companies was restricted to providing convenient Internet access at halls or conference rooms. In such an application, the performance was quite suitable and took a secondary place in an IT infrastructure. However, literally […]


Threats & Malware, Vulnerabilities

Infosec chap: I found a way to hijack your web accounts, turn on your webcam from Safari – and Apple gave me $100k

January 26, 2022

Via: The Register

A security bod scored a $100,500 bug bounty from Apple after discovering a vulnerability in Safari on macOS that could have been exploited by a malicious website to potentially access victims’ logged-in online accounts – and even their webcams. Ryan […]


Cloud security, Security

Fugue Organization Management streamlines security oversight for large cloud operations

December 17, 2021

Via: Help Net Security

Fugue announced a cloud security platform that enables enterprises to establish centralized security visibility and governance over their cloud environments, while empowering individual business units with the flexibility they need to innovate and compete. Now, Fugue Organization Management operationalizes cloud […]


Mobile, Mobile security

SAIC Rugged Apps delivers secure commercial applications to government users

December 17, 2021

Via: Help Net Security

Science Applications International Corp (SAIC) launched Rugged Apps, which provides government customers with highly secure versions of commercial mobile applications and software scanning services for apps. Rugged Apps fortifies mobile applications by ensuring they are National Information Assurance Partnership (NIAP) […]


Network security, Security

Stratodesk NoTouch LTS helps IT teams ensure their VDI/DaaS deployment

December 16, 2021

Via: Help Net Security

Stratodesk released Stratodesk NoTouch Long Term Support (LTS), delivering security and Day One updates including the features enterprises need within their secure digital perimeter to ensure ongoing productivity without the need for full production approval testing. “Stratodesk NoTouch LTS allows […]


Network security, Security

Adoption of private 5G networks accelerates, as organizations look to improve security and speed

December 16, 2021

Via: Help Net Security

There’s a significant interest in private 5G networks, with 90% of executives expecting that private 5G will become the standard network choice, according to an Economist Impact survey. Where is private 5G being deployed? The research shows that 51% of […]


Threats & Malware, Vulnerabilities

Modern cars: A growing bundle of security vulnerabilities

December 14, 2021

Via: Help Net Security

In this interview with Help Net Security, Laura Hoffner, Chief of Staff at Concentric, talks about modern car vulnerabilities, the techniques hackers are using to compromise connected vehicles and how to protect users. Cars are becoming increasingly smart and an […]


Application security, Security

SaaS security is becoming a primary concern for businesses

September 27, 2021

Via: Help Net Security

One of the frequently touted advantages of using software-as-a-service (SaaS) solutions is their maintenance-free and supposedly inherently secure nature. These services are maintained by their providers and users do not have to worry about configuring, troubleshooting, and updating them. Things […]


Access control, Security

Did you give away your password in the comments section?

August 25, 2021

Via: Panda Security

Facebook and Instagram have been flooded with groups, pages, and profiles that post funny quizzes asking members and followers to answer questions that prompt engagement, such as how old they were for specific dates or events in their lives. Naturally, […]


Threats & Malware, Vulnerabilities

Hospitals still not protected from dangerous vulnerabilities

August 13, 2021

Via: Help Net Security

Ipsos conducted a research which examines attitudes, concerns, and impacts on medical device security as well as cybersecurity across large and midsize healthcare delivery organizations. Insights include how they correlate and diverge. Healthcare is one of the most targeted industries […]


Cloud security, Security

36% of organizations suffered a serious cloud security data leak or a breach in the past year

July 27, 2021

Via: Help Net Security

As cloud adoption accelerates and the scale of cloud environments grows, engineering and security teams say that risks—and the costs of addressing them—are increasing. The findings are part of the State of Cloud Security 2021 survey conducted by Fugue and […]


Privacy protection, Security

Data-localization policies are spreading rapidly around the world

July 26, 2021

Via: Help Net Security

The global economy increasingly depends on data flowing freely across borders, yet the number of nations with regulatory barriers preventing that from happening has nearly doubled in four years—from 35 countries in 2017 to 62 now, according to a new […]


Cyber-crime, Malware, Phishing

Are hackers getting rich by using gamers?

June 28, 2021

Via: Panda Security

Some gamers do really well, professional gamers sometimes earn millions. However, not all video game players are rich celebrity influencers. Very often, regular gamers cannot even afford to purchase the game they want to play. With no money in the […]


Network security, Security

SolarWinds, Exchange attacks revive calls for mandatory breach notification, better information sharing

May 24, 2021

Via: CSO Online

On the heels of three major cybersecurity incidents over the past six months—the SolarWinds and Microsoft Exchange supply chain attacks and the Colonial Pipeline ransomware attack—government officials and some in the private sector are reviving calls for better information sharing […]


Access control, Security

Use longitudinal learning to reduce risky user behavior

May 4, 2021

Via: Help Net Security

People ignore information that isn’t relevant to them, which is why IT and HR departments have been approaching security training incorrectly for years. Long-form, all-hands security seminar trainings have contributed to nearly daily data breaches for decades. HR and security […]


Network security, Security

Attacks on Medical Industry: ‘Global Threat to Health’

March 12, 2021

Via: SecureWorld

Cybersecurity is not just about data and network security; it’s about life security. Cyberattacks can have very personal consequences. We have seen examples of this throughout 2020 with an increase in cyberattacks targeting the healthcare sector due to the pandemic. […]