Podcast: Could the Zoho Flaw Trigger SolarWinds 2.0?

Companies are worried that the highly privileged password app could let attackers deep inside an enterprise’s footprint, says Redscan’s George Glass. A month ago, the FBI, CISA and the U.S.…

Acer Confirms Second Security Breach

Acer Confirms Second Security Breach Another cybersecurity breach has occurred at Taiwanese computer manufacturer Acer. Earlier this year, the company suffered a $50m ransomware extortion attempt after falling prey to the REvil ransomware…

Cloud Security: Report Finds 68% of Malware Delivered From Cloud Apps

Security Intelligence – Security Intelligence – Cloud Security: Report Finds 68% of Malware Delivered From Cloud Apps Cloud apps are now the most common way digital attackers distribute malware. In…

Risks of preinstalled smartphone malware in a BYOD environment

The bring-your-own-device (BYOD) trend has been growing for many years, but the wider adoption of a remote or hybrid workforce in a post-COVID world may create an influx of personal…

How to run a software composition analysis tool

Protecting your organization’s website from cyberthreats is important. Websites and data servers hold important information, after all. One way to project your website is by utilizing a web application security tool.…

5 reasons to implement a self-doxxing program at your organization

Human beings are social animals, and most of us like to connect with others. In doing so, we tend to share personal data. In an age where that personal data…

Key findings from ESG’s Modern Application Development Security report

A deep dive into security issues In August 2020, the Enterprise Strategy Group (ESG) published its report, “Modern Application Development Security.” ESG is a company specialized in IT-related research. It…

What the Cybersecurity Landscape Looks Like in 2021

Trend Micro – Trend Micro – The COVID-19 pandemic shifted many enterprises into a new way of working, forcing a fast and swift implementation of new systems and policies to…

Information security strategy for the hybrid and multi-cloud

Cloud computing is omnipresent, and most organizations are opting for a model that combines several types of cloud infrastructure: private and public cloud (known as hybrid cloud) or public clouds…

IoT Security Fundamentals: Hardware, Software and Radio Security

What is IoT – IoT stands for Internet of Things. The Internet of Things (IoT) is the interconnection and network of various devices formed by connecting any physical device (Vehicle,…