Growing trust in the security of cloud solutions
A growing number of companies have decided to store sensitive data in the cloud. However, hybrid cloud solutions are still widely used.
This is evidenced by a report from security company Trustwave, based on a poll among 966 IT professionals. Of those respondents, 95 percent said they plan to mo... Read more
Barely 1 in 3 cybersecurity experts get accurate and relevant threat data
The pandemic is in full swing, and cybercriminals are attacking everyone. They are taking every opportunity to challenge IT security pros, and it is working out for the hackers. IT pros need fresh, relevant, and precise data to analyze the threats presented to them.
In an environment that moves ... Read more
The pandemic led to a surge in DDoS and Password Login attacks
In May and June, businesses may have caught a break, but cyberattacks are still becoming increasingly common. It is a well-documented fact that cyber-attacks against businesses and consumers have dramatically increased due to the pandemic.
F5 labs recently revealed more about the methods and t... Read more
Cisco ordered to pay $1.89bn to Centripetal Networks
Cisco was found guilty of infringing on four Centripetal patents.
Cisco Systems was ordered today to pay $1.89 billion for patent-infringement against cybersecurity tech firm Centripetal Networks. The case brought by Centripetal also accused Cisco of pushing Centripetal out of lucrative governm... Read more
CrowdStrike acquires Preempt Security for $96M
The acquisition allows CrowdStrike to offer customers enhanced zero trust security capabilities.
CrowdStrike has announced that it plans to acquire Zero Trust cybersecurity startup Preempt Security for $96 million.
Under the terms of the agreement, CrowdStrike will pay approximately $96 mill... Read more
Microsoft CISO: Big data is ‘giving us an edge over hackers’
The ability to utilize massive resources is giving Microsoft the upper hand in the battle against cybercriminals.
The enormous size and diversity of signal data that Microsoft’s security teams have at their disposal has dramatically improved the company’s response to cyber security threats. ... Read more
New Windows exploit allows any user to become an admin
A recently patched Windows exploit lets anyone with a network connection obtain full access to the Active Directory domain-controller.
Researchers at Secura have developed and published a proof-of-concept exploit for a recently patched Windows vulnerability that can allow access to an organizati... Read more
Oracle announces new cloud security tools
Two new services will help customers to secure their Oracle Cloud environment.
Oracle announced the general availability of two cloud security tools that are designed to help reduce the risk of data breaches caused by human error.
The new services, Oracle Cloud Guard and Maximum Security Zone... Read more
By 2024, CEOs will be held responsible for cybersecurity failures
Gartner expects CEOs to be directly held responsible for lapses in cybersecurity in the next four years. The liability for failing to safeguard a company against attack will be attributed to CEOs' failure by 2024.
The analyst firm predicted that cyber-physical systems (CPSs) incidents will final... Read more
Shadow code could increase vulnerability of businesses to attack
Companies often use third-party scripts or open-source libraries to speed up their development processes. This type of code is called Shadow Code and is very useful in open innovation, among other functions. However, it increases the risk of vulnerability to cyberattacks.
In a new report publish... Read more