- Welcome Guest
- Sign In
New research from cloud security firm Ermetic shows that nearly all businesses have identities that, if compromised, would place at least 90 percent of the S3 buckets in their AWS account at risk. Ermetic conducted the study to determine the circumstances that would allow ransomware to make its way ...
The Finland-based security consultancy discovered vulnerabilities affecting over 150 different HP multifunction printer products. Attackers can exploit the flaws to seize control of devices, steal information, and further infiltrate networks to inflict other types of damage, according to F-Secure's ...
Linux Foundation Research and SODA Foundation have released study results on new data and storage trends for enterprise. The 2021 Data and Storage Trends Report reveals enterprise use of data and storage as it relates to cloud services and workloads in the era of cloud native, edge, IoT and 5G. Data...
Businesses are flocking to software-as-a-service applications as a means to improve the efficiency of their operations and the productivity of their employees, but weak control of access to cloud apps is putting the data of many organizations at risk. According to a study by DoControl, the average 1...
Disruptions to power grid systems can have devastating effects. Despite the fact that consistent electric power has been a basic human need for more than a century; more than ever, the grid faces a growing onslaught of threats. We spoke with experts in the field about the critical nature of the grid...
Hackers aren't the only ones evading security measures of many organizations. So are their remote workers. In a new report on remote workforce security, 52 percent of the U.S. IT and cybersecurity professionals surveyed revealed they experienced remote workers finding workarounds to their organizati...
Even as operations as diverse as factories and hospitals are moving at least portions of their daily computational processes out of the centralized cloud and into various edges, edge computing for many people remains a mysterious concept. To provide some clarity and insight, we spoke with several ex...
A configuration error in the systems of content delivery provider Fastly knocked out numerous large websites and apps around the globe Tuesday. The event served up a reminder of how distributed networks play a critical role in the internet today -- and how important it is to make sure that the softw...
That old adage about crime never pays could not be more false, at least when it comes to modern-day cybercriminals. For those bad actors using ransomware as their weapon, crime is paying more than ever. A new report by the eSentire security research team found that six ransomware gangs claimed at le...
IT experts at the hacked Colonial Pipeline did a good job in mitigating the May 7 cyberattack and successfully stopped it when discovered by shutting down the network. But the attack was mostly invisible in the weeks-long initial stages, according to a briefing NTT Security executives conducted Tues...
New research by threat detection and response firm Vectra AI shows that the most common threats to corporate networks remain consistent throughout all companies -- regardless of their size. Researchers calculated the relative frequency of threat detections that were triggered during a three-month sp...
Advancements in 5G connectivity and accelerated digital transformation of business operations creates heightened risk and expanded attack surfaces for security teams to harden and protect. Now, efforts by several internet industry groups are focused on new measures to fix inherent security weaknesse...
The 2021 edition of Proofpoint's Voice of the CISO report -- based on a survey of more than 1,400 CISOs in 14 countries -- found 66 percent of the executives acknowledged their organizations were unprepared to handle a targeted cyberattack this year. In addition, more than half the CISOs admitted th...
A recent study by Kaspersky revealed that nearly one quarter of PCs still run Microsoft Windows 7, which stopped receiving mainstream support in January 2020. Using an end-of-life operating system that no longer receives security updates is akin to driving a car with a brake light on, suggested Oli...