53% of enterprises have no idea if their security tools are working

The majority of organizations don’t know if the security tools they deploy are working, and are not confident they can avoid data breaches, according to AttackIQ. AttackIQ released the report based on Ponemon Institute research evaluating the efficacy … Continue reading 53% of enterprises have no idea if their security tools are working

How to secure your data as you go digital

To scale more efficiently and serve customers better, companies are moving more workloads and services to the cloud. According to IDG, 37 percent of companies are increasing their digital business, and 45 percent are in the process of becoming digital-… Continue reading How to secure your data as you go digital

Security trends to follow at Black Hat USA 2019

Black Hat USA 2019 is just around the corner! Selecting which sessions to attend from among the conference’s jam-packed catalog of training sessions, panels and briefings can be a daunting task without a clear strategy. In the run-up to every conferenc… Continue reading Security trends to follow at Black Hat USA 2019

200 million enterprise, industrial, and medical devices affected by RCE flaws in VxWorks RTOS

Armis researchers have discovered 11 vulnerabilities (including 6 critical RCE flaws) in Wind River VxWorks, a real-time operating system used by more than two billion devices across industrial, medical and enterprise environments. Collectively dubbed … Continue reading 200 million enterprise, industrial, and medical devices affected by RCE flaws in VxWorks RTOS

Cloud adoption and security are not mutually exclusive

As organizations continue to adopt cloud services to achieve their desired business objectives, many don’t realize that the thing that makes cloud computing great – speed, agility, easy implementation and scalability – also make it a nightm… Continue reading Cloud adoption and security are not mutually exclusive

The dynamic of modern security challenges: Issues security leaders face today

We sat down with Neil Weicher, CTO & Founder, NetLib Security, to discuss encryption technologies, the threat of legacy applications, the complexity of cloud security, medical IoT, and more. You’ve been in the information security industry f… Continue reading The dynamic of modern security challenges: Issues security leaders face today

The rise of biometrics and passwordless security

Whether you realize it or not, our current era of mobile and cloud computing can be defined, both positively and negatively, by shared secrets. Shared secrets — passwords, authentication, and legacy multi-factor authentication — is the synchronous rela… Continue reading The rise of biometrics and passwordless security

The need for scalable OT security

As manufacturers and other industrial network owners are becoming more security conscious, they are coming up against security performance issues. Operational Technology (OT) networks are increasingly becoming targets for cyberattacks, yet many of the … Continue reading The need for scalable OT security

How to improve the hiring and retaining of infosec professionals?

The cybersecurity staffing and skills shortage is a well-known reality and the situation is predicted to get worse in the coming years. There are many problems There are several reasons for the current situation: Organizations are asking for too much a… Continue reading How to improve the hiring and retaining of infosec professionals?

How AI can improve user experience and security for the finance industry

For the last 50 years, the fundamental and largely unchanged model for identifying and authenticating users has been based on the combination of a username and password, sometimes augmented with “second factor” techniques. While this approach has mostl… Continue reading How AI can improve user experience and security for the finance industry