Cybersecurity Trends for 2022

Trend Micro – Trend Micro – You’ve heard it before: the pandemic accelerated digital transformation. And there doesn’t seem to be any signs of slowing down. But what does an…

Misconfigured Kafdrop Instances Lead to Sensitive Data Exposure for Many Companies

A new report shows how cloud misconfiguration could lead to critical data exposure of an organization. Researchers revealed that misconfigured Kafdrop instances, Kafdrop being the Apache Kafkas’s management interface, led…

Apache Kafka Cloud Clusters Expose Sensitive Data for Large Companies

The culprit is misconfigured Kafdrop interfaces, used for centralized management of the open-source platform. Some of the world’s largest companies have exposed reams of sensitive information from the cloud, researchers…

Apache Kafka Cloud Clusters Expose Sensitive Data for Large Companies

The culprit is misconfigured Kafdrop interfaces, used for centralized management of the open-source platform. Some of the world’s largest companies have exposed reams of sensitive information from the cloud, researchers…

Hybrid cloud brings benefits. But it also brings new cybersecurity risks, too

The use of cloud computing applications has grown significantly in the last two years as the Covid-19 pandemic forced many organisations to adapt to remote working. Many of those businesses…

Panasonic’s Data Breach Leaves Open Questions

Cyberattackers had unfettered access to the technology giant’s file server for four months. Consumer electronics giant Panasonic’s data breach raises questions, researchers say – given that more than two weeks…

Data Breach at Panasonic

Data Breach at Panasonic The Panasonic Corporation has disclosed a data security incident in which an undisclosed amount of data was compromised. In a statement issued Friday, the major Japanese multinational conglomerate announced that…

'AI Will Revolutionize Every Aspect of Connectivity,' Argue Cyber Experts

'AI Will Revolutionize Every Aspect of Connectivity,' Argue Cyber Experts "AI will revolutionize every aspect of connectivity," was the bold message delivered during a recent webinar by the IDC titled 'AI…

Essential Microsoft EDR Tools

EDR (Endpoint Detection and Response) should be an essential part of any great cybersecurity strategy. Endpoint security is critical for any company since most of the successful breaches originate on…