18.4 C
Munich
Monday, April 29, 2024

Articles

How to Secure Your Zoom Meetings

Increasingly more people are remote working and many are using the videoconferencing platforms for meetings and training. There is a range of virtual conference...

Enhanced Automated Vulnerability Management for Cloud Workloads Announced by AWS

Newly added capabilities for the Amazon Inspector service will meet the "critical need to detect and remediate at speed" in order to secure cloud workloads.

Apple sues company known for hacking iPhones

Apple sues company known for hacking iPhones on behalf of governments. An Israeli firm called NSO Group, provided software to government agencies and law...

More than Half of Organizations Are Not Effectively Defending Against Cyberattacks

According to a recent Accenture study, more than half of organizations are not effectively defending against cyberattacks. 55% of large companies are not effectively stopping...

Find Out If Any of Your Accounts Has Been Hacked

Other than the infamous HaveIBeenPwned website, which lets you check if any of your accounts has been involved in any data breach, Google can...

88% of Boards of Directors View Cybersecurity as a Business Risk

Eighty-eight percent of Boards of Directors (BoDs) view cybersecurity as a business risk, as opposed to a technology risk, according to a new survey*...

Watch Out Shoppers! Number of Malicious Shopping Websites Jumps 178% ahead of Black Friday Sales

Check Point Research spotted over 5300 malicious websites per week, marking it the highest since the beginning of 2021. The number of malicious...

The King of Most Common Passwords Still Sits on its Throne

The King of Most Common Passwords Still Sits on its Throne!!NordPass has published a study with the top 200 most common passwords for 2021....

The Rise Of Killware

Digital transformation and the optimization of business processes drive organizations to increase and evolve the connectivity of IT and OT environments. For those unfamiliar...

Top Threats for WordPress Sites in 2020

Security firm "Wordfence" published a new report from data gathered from its 4 million customers that have its software installed. The report identified three major...

What is a “Zero-Day” Exploit

What is a Zero-Day Exploit, what is the timeline of a zero-day attack, examples of zero-day attacks and ways to defend your organization.

Don’t FAIL your DLP Program

So you want to implement a Data Loss Prevention Program to secure your data. You go ahead and purchase one of the top rated(?)...

Latest