Global Security Skills Shortage Falls to 2.7 Million Workers

Global Security Skills Shortage Falls to 2.7 Million Workers The global cybersecurity skills shortage has fallen for the second consecutive year, but the size of the workforce is still 65%…

Ransomware: Industrial services top the hit list – but cyber criminals are diversifying

Businesses in industrial goods and services are still the most popular target for ransomware attacks, but cyber criminals are increasingly diversifying which organisations they’re extorting.  Ransomware has become a major cybersecurity issue,…

Cisco SD-WAN Security Bug Allows Root Code Execution

The high-severity bug, tracked as CVE-2021-1529, is an OS command-injection flaw. Cisco SD-WAN implementations are vulnerable to a high-severity privilege-escalation vulnerability in the IOS IE operating system that could allow…

Asana rolls out Enterprise Work Graph for cross-team coordination

Asana’s Universal Reporting feature Asana Special feature Turning Big Data into Business Insights Businesses are good at collecting data, and the Internet of Things is taking it to the next…

Security, remote work support top concerns amongst firms

Increasing adoption of hybrid work practices has pushed the need to enable and secure remote workers as a top challenge for IT managers. Security threats also have evolved amidst this…

CISA says BlackMatter ransomware group behind recent attacks on agriculture companies

CISA, the FBI and NSA officially implicated the BlackMatter ransomware group in the recent attacks on two agriculture companies, confirming the assessments of some security researchers who said the gang…

A Guide to Doing Cyberintelligence on a Restricted Budget

Cybersecurity budget cuts are everywhere. Chad Anderson, senior security researcher at DomainTools, discusses alternatives to fancy tooling, and good human skills alignment. For those in the industry, it comes as…

Cloud security is an ongoing struggle to keep sensitive data safe. Is it getting any easier?

The latest cloud security breaches show that we have miles to go as we keep fighting to keep our sensitive data safe.  2020 marked a record number of cyberattacks. Cloud-based…

The Complete Guide to IoT Security and What Every Business Owner Needs to Know

We might feel that technology plays an enormous role in our lives, always with our eyes on our phones or turning on the TV right after we got home –…

Intune vs. WSUS vs. SCCM – Costs, Benefits, Ease of Use, and Deployment

Patching has certainly gained a lot of momentum ever since research has proven that ‘unattended’ apps and software can quickly lead to a data leak.  Patching is the new ‘kid’…