Vulnerabilities

Why Don’t Employees Prioritize Their Company’s Cybersecurity?
Data Protection & Privacy Why Don’t Employees Prioritize Their Company’s Cybersecurity?

Amidst an escalating landscape of cyber threats, a worrying trend has emerged: employees' striking indifference to their roles in protecting company data. Despite the rising frequencies and stakes of cyber attacks, many employees remain disengaged from their responsibilities towards

How Can CISOs Communicate Security Risks to the Board Effectively?
Infrastructure & Network Security How Can CISOs Communicate Security Risks to the Board Effectively?

Chief Information Security Officers (CISOs) often face a significant challenge in communicating security risks to the board of directors, who are primarily concerned with the business implications of these risks rather than the technical specifics. This communication gap can impede effective

New Vulnerability Discovered in Microchip ASF Puts IoT Devices at Risk
Malware & Threats New Vulnerability Discovered in Microchip ASF Puts IoT Devices at Risk

In a significant security development, the Microchip Advanced Software Framework (ASF) has been found to contain a new vulnerability, raising substantial concerns for Internet of Things (IoT) applications. Cataloged as CVE-2024-7490, this flaw has the potential to expose millions of devices to

Are Cybersecurity Measures Enough to Thwart Persistent Hacker Threats?
Infrastructure & Network Security Are Cybersecurity Measures Enough to Thwart Persistent Hacker Threats?

Cybersecurity has become a critical issue for organizations worldwide, with the recent data theft incident involving Deloitte underscoring the relentless and evolving nature of cyber threats. As hackers grow more sophisticated, companies must continuously adapt and improve their security measures

How Is Microsoft Boosting Security After the Chinese Email Breach?
Infrastructure & Network Security How Is Microsoft Boosting Security After the Chinese Email Breach?

In July 2023, the cyber world watched in alarm as the Chinese hacking group Storm-0558 successfully breached U.S. government email accounts by exploiting vulnerabilities in Microsoft's cloud email service. This breach did not just expose serious flaws in one of the world's most prominent

How Will the Checkmarx and ZAP Partnership Transform App Security?
Infrastructure & Network Security How Will the Checkmarx and ZAP Partnership Transform App Security?

In the ever-evolving realm of cybersecurity, the collaboration between Checkmarx, a pioneer in cloud-native application security, and ZAP (Zed Attack Proxy), the leading Dynamic Application Security Testing (DAST) tool, is creating ripples. This strategic alliance aims to uplift the capabilities of

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later