High number of security flaws found in EMEA-developed apps
Applications developed by organizations in Europe, Middle East and Africa tend to contain more security flaws than those created by their US counterparts, according to…
Applications developed by organizations in Europe, Middle East and Africa tend to contain more security flaws than those created by their US counterparts, according to…
For companies to avoid bleeding millions through cyber threats, they must build adaptability into their security strategy from the start while considering a range of…
An ancient timing oracle attack against RSA encryption has re-emerged, with a Red Hat researcher saying an oracle attack first discovered in 1998 by Daniel…
Network Flight Simulator is a lightweight utility that generates malicious network traffic and helps security teams evaluate security controls and network visibility. The tool performs…
Macquarie University has appointed a new chief information and digital officer (CIDO) with acting CIO Jonathan Covell officially taking over the position. Jonathan Covell. Macquarie…
71% of IT professionals stated that cloud-related costs make up 30% or more of their total IT spend, according to Aptum. In the current demanding…
A widespread Salesforce outage last week was caused by the rollout of a new permissions policy as part of defence-in-depth efforts that mistakenly locked users out…
A very clever and complex phishing campaign uses organizations in the hospitality industry to get customers’ credit card information. Staff in the hospitality industry are…
Google has stated that the unintentional indexing of these conversations in its search engine results is being addressed, and steps are being taken to prevent…
Canadian healthcare organization Better Outcomes Registry & Network (BORN) has disclosed a data breach affecting client data. Canadian healthcare organization Better Outcomes Registry & Network…
Digital transformation may be revolutionizing businesses and the way we operate, but it also presents notable challenge: How can organizations stay secure amidst the ceaseless tide of change? Our latest…
A vulnerability in Juniper Networks’ EX switches and SRX firewalls that first emerged in August is in the spotlight again, with researchers disclosing a fileless…