Feds’ demand for software standards could boost enterprise security
An executive order issued in May by the Biden Administration has elevated the status of the software bill of materials, by mandating their use in federal government contracting. Enterprises can...
What are the security priorities for the post-coronavirus world?
The Covid-19 pandemic is forcing massive change across the business world and things may never go back to normal. What does security look like in this new world, and what...
Ransomware a continued threat to business, report warns
Businesses are increasingly becoming the most popular targets for ransomware, which remains a top cyber threat around the world, especially in the US, a report reveals. Business ransomware detections increased by 365% in the...
12 dark secrets of cloud security
The cloud is essentially a dark pool of computational power and that mystery can lull us into complacency. Here’s what you don’t know about keeping your data secure in the...
Cybersecurity: One in three breaches are caused by unpatched vulnerabilities
Flaws are left open for weeks or longer even when fixes exist, security experts admit, leaving organizations at risk. Forget the stealthy hacker deploying a never-before-seen zero day to bring...
Cyber criminals targeting C-suite, DBIR shows
Executives and cloud-based services are gaining popularity as targets for cyber criminals, according to the latest data breach investigations report. C-level executives who have access to a company’s most sensitive data...
Business email compromise made easy for cyber criminals
Poor security practices and access to hacking services are making it easy for cyber criminals to compromise business email, research reveals. Around 12.5 million company email boxes and 33,000 finance...
Securing the future: The evolution of cyber security in the wake of digitalization
With threats becoming more complex, moving from basic attacks against one device to complicated attacks against every device on an organisations network, traditional security simply isn’t enough in the age...
Full Disclosure Applies to Internal Security Too
If you’ve been keeping up with the news, you’ve probably noticed a few recent reports about companies that may have been a little less than candid about security issues. For...
Tackling security with container deployments
The most effective and proactive way of controlling that security risk is by finding and removing vulnerabilities in base images. Containers provide an effective way to deliver a compact, portable...