Enterprise leaders in procurement, IT, and finance need to take immediate action to rationalize their SaaS portfolios to prevent spending...
COMMENT Corporate defendants besieged by proliferating bet-the-company privacy and consumer class action lawsuits recently scored a victory in the US Supreme Court with implications for data breach victims. The...
WizCase’s security team, led by Ata Hakçıl, found a significant breach affecting Reindeer, an American marketing company previously associated with Patrón Tequila, Tiffany & Co. and other brands. This...
An estimated 44% of cloud user privileges are misconfigured, leaving companies at risk, according to Varonis’s 2021 SaaS Risk Report. Varonis gathered and analyzed data from over 200,000...
NSA released the Cybersecurity Information Sheet, “Securing Wireless Devices in Public Settings,” to help National Security System (NSS), Department of Defense (DoD), and Defense Industrial Base (DIB) teleworkers...
As we begin to come out of the coronavirus pandemic in the U.S., we enter a new world of business in many facets. One area of...
Cisco has addressed a vulnerability in the Firepower Device Manager (FDM) On-Box software that could be exploited to gain code execution on vulnerable devices. FDM On-Box...
Google Chrome will no longer show whether a site you are visiting is secure and only show when you visit an insecure website. For years, Google...
Today, 1 in 15 government workers is exposed to social engineering attacks. In 2018, The Atlantic published an article on the dangers of email, saying, “Electronic mail as we...
Attackers who exploit critical security vulnerabilities in Swisslog’s TransLogic Pneumatic Tube System (PTS) could potentially reroute or shut down the automated delivery of medications and other vital items...
A number of British universities have been awarded a grant to explore the security issues surrounding Internet of Things (IoT) and smart home devices, as well as to...
Recent Comments