Five ways attackers can create havoc in smart homes
Attack motives include burglaries, cyber stalking, botnet creation, cryptocurrency mining hubs, theft of personal information or financial information.
Ping Identity launches private cloud identity solution
Gartner, Forrester name Retarus for Email Security
SentinelOne launches next-gen server protection offering
Slack tackles balance between productivity and security
Check Point: Attackers executing commands remotely with latest malware
Genetec shows impressive growth, says IHS Markit
DDoS attacks on the rise despite taking a summer break
“Traditionally, troublemakers who conduct DDoS attacks for fun go on holiday during the summer and give up their activity until September."
Sophos report reveals barriers to cybersecurity preparedness in APJ
85% of APJ organisations believe the biggest challenge to their security in the next 24 months will be improving cybersecurity awareness and education among employees and leadership.
Venafi announces guarantee for no certificate-related outages
Eliminating certificate-related outages within complex, multi-tiered architectures can feel like an impossible effort.
ESET: Ignoring human element in cyber safety a mistake
"We believe that when employees are aware of their potential blindspots, they are naturally more invested and better prepared to be wary of things that may not seem quite right."
Vulnerabilities in cloud containers soar, report finds
“Cloud technology and adoption has obviously skyrocketed, so it’s no surprise that vulnerabilities within cloud technology will increase."
OutSystems gains new certifications for cloud security compliance
These certifications demonstrate the level of commitment OutSystems has to ensuring the privacy and protection of its customers’ data in the cloud.
Keysight solution helps prevent cyber-attacks on connected vehicles
Potential issues identified post-production, with the risk of recalls, cost orders of magnitude more to repair than when found during pre-deployment testing.
Nintex bolstered by independent security report
Nintex Workflow Cloud’s security controls are up to scratch, with not one single instance where a security control wasn’t working, or not in place.
Attackers upping the ante on evasion and anti-analysis - Fortinet
Cyber-adversaries are becoming more sophisticated in their obfuscation and anti-analysis practices to avoid detection.
Microsoft and CyberArk lead GlobalData identity management theme
Both companies gained the highest score for the identity management theme in GlobalData’s Thematic Scorecard for the security software sector.
Business ransomware detections spiking - Malwarebytes
Ransomware attackers are targeting large, ill-prepared public and private organisations with easy-to-exploit vulnerabilities.
Jamf extends Apple expertise through security firm buyout
IT and Apple specialist firm Jamf has acquired Mac-focused endpoint security provider Digita Security.
Security teams spend 25% of their time chasing false positives
The report also showed that teams were also concerned about investigating actionable intelligence and building incident timelines as well as cleaning, fixing and/or patching networks.
The dark side of apps: Security threats on the rise
"Think about it, unsecured Wi-Fi, spoofing, phishing attacks, ransomware, spyware... mobile devices make for the perfect target."
BitSight announces enterprise analytics to help security leaders manage risk
The solution provides visibility into which groups have the biggest impact on their organisations' overall cyber risk posture and helps identify areas for security performance improvement.
More than half of personal data breaches caused by human error
"The biggest cause of breaches remains the fallibility of people and an inherent inability of employees to send emails to the right person."
Understanding VMware in just 4 minutes
We look at the companies history and key technology solutions.
Limiting access key to minimising data breaches, says expert
"When a company provides only a minimum amount of access needed for the employees to fulfil their roles, the risk of wide-spread breach greatly diminishes."
Broadcom set to own Symantec’s enterprise security business for $10.7B
"M&A has played a central role in Broadcom's growth strategy and this transaction represents the next logical step in our strategy following our acquisitions of Brocade and CA Technologies," says Broadcom CEO