Advertisement

risk assessment - challenge - danger

Enterprises report rise in risk events, yet risk management lags

More threats to data, privacy are the top concerns of risk managers and are becoming “the new normal.”


A magnifying lens exposes an exploit amid binary code.

CISA issues emergency warning over two new VMware vulnerabilities

The U.S. Cybersecurity and Infrastructure Agency issues emergency security directive over VMware vulnerabilities CVE-2022-22972 and CVE-2022-22973, which threat actors are likely to exploit.


intro security vulnerability

Two account compromise flaws fixed in Strapi headless CMS

The vulnerabilities allow attackers to use a low-privilege account to reset the password of a higher-privilege account.


Advertisement

Encryption  >  A conceptual technological lock and encrypted code.

QuSecure launches end-to-end post-quantum cybersecurity solution

QuSecure claims new solution is the industry’s first end-to-end quantum software-based platform that protects encrypted communications and data using a quantum-secure channel.


Multiple-exposure shot of a clock and calendar pages. [time / past / future / history / what's next]

WannaCry 5 years on: Still a top threat

As security pros reminisce about the ransomware’s anniversary, some note the more things change, the more they stay the same.


binary highway

Uber CISO's trial underscores the importance of truth, transparency, and trust

The criminal trial offers a lesson in the value of both CISOs and organizations adhering to a policy of truth, transparency and trust when it comes to security.


https ssl certificate

How to choose a certificate management tool

Managing certificates that hold all your encryption secrets is impossible without the right tool. Here's how to narrow the field.


cloud security / data protection / encryption / security transition

Deepfence Cloud builds on ThreatStryker security observability platform

The SaaS version of ThreatStryker will build on its real-time observation and protection abilities, spanning multiple cloud and development instances.


Conceptual image of a network of executives / silhouettes of executives in motion.

New US CISO appointments, May 2022

Keep up with news of CSO, CISO, and other senior security executive appointments.


authentication

How SAML works and enables single sign-on

Security assertion markup language (SAML) is an open standard that defines how providers can offer both authentication and authorization services. Here's what you need to know.


Advertisement

Industry 4.0 / Industrial IoT / Smart Factory / robotics / automation

NanoLock’s zero-trust cybersecurity suite to protect industrial machinery, production lines

Vendor claims to be the first to offer device-level protection solutions designed for legacy and new industrial machinery and smart factory production lines.


digital identity / authentication

Open-source standard aims to unify incompatible cloud identity systems

The project uses open source tech and a new common policy format to manage identity access policies across multi-clouds, on-premises systems, and vendors.


An abstract network of nodes or endpoints.

What Microsoft Defender can tell you about your network

Microsoft Defender for Business alerts can show what's happening in your network. The better you understand your network, the faster you can triage alerts.


Linux security shield

Top Linux endpoint protection software

Malware attacks on Linux systems are on the rise. These free and low-cost tools provide good endpoint protection.


Blurry hands typing on computer keyboard

Keyloggers explained: How attackers record computer inputs

A keylogger (short for keystroke logger) is a tool that can record and report on a computer user's activity as they interact with a computer.