You probably hear a lot about technical concepts such as digital modernization and transformation. Modernization and transformation quite simply are ways to upgrade all or parts...
In the wake of recent major cybersecurity incidents, such as the SolarWinds, Microsoft Exchange, and Colonial Pipeline attacks, the Biden administration has released an executive order...
With most of the world still anxious about COVID-19 and demand for vaccines high, new McAfee research sheds light on how hackers are targeting these fears with...
The world has experienced a data explosion in recent years. In 2020 alone, 64.2 zettabytes of data were created or replicated, according to IDC. This is roughly...
It would be comforting if the only cyber-risks organizations had to worry about were the ones that smacked up against their firewall and endpoint security solutions....
The explosion of high-profile ransomware attacks has been dominating the news in the IT sector of late, but most of the time – and for years,...
The insider threat is not a new risk for security teams, but with ransomware, phishing and myriad other “flashy” external threats targeting organizations, it has been...
The REvil ransomware operation have added a Linux encryptor to their arsenal that’s designed to target and encrypt Vmware ESXi virtual machines. BleepingComputer reports that security researcher MalwareHunterTeam...
Mira LaCous, Chief Technology Officer (CTO) of the biometrics-led identity access management provider, BIO-key International, talks to Security magazine about current trends in biometric security. Security: What...
(ISC)² – nonprofit association of certified cybersecurity professionals – announced that its healthcare security and cloud security certifications have been approved by the U.S. Department of Defense...
Recent Comments