Cybersecurity fears drive a return to on-premise infrastructure from cloud computing
42% of organizations surveyed in the US are considering or already have moved at least half of their cloud-based workloads...
Read more →42% of organizations surveyed in the US are considering or already have moved at least half of their cloud-based workloads...
Read more →The two ScreenConnect vulnerabilities ConnectWise has recently urged customers to patch have finally been assigned CVE numbers: CVE-2024-1709 for the...
Read more →The speed of cyberattacks continues to accelerate at an alarming rate, according to CrowdStrike. Adversaries increasingly exploit stolen credentials The...
Read more →If you are a large-scale company, the recent AI boom hasn’t escaped your notice. Today AI is assisting in a...
Read more →2Organizations are increasingly turning to Managed Service Providers (MSPs) to alleviate pressure on IT departments, according to SonicWall. Managed services...
Read more →VMware Enhanced Authentication Plug-in (EAP), a plugin for VMware vSphere, has two vulnerabilities (CVE-2024-22245, CVE-2024-22250) that could be exploited by...
Read more →Beyond Identity released a new Device360 solution for continuous device security posture management. Device360 is the device security tool designed...
Read more →Check Point introduces Check Point Quantum Force series: a lineup of ten firewalls designed to meet and exceed the stringent...
Read more →Nearly every organization has core systems services tied to Active Directory that will go down during an outage, according to...
Read more →In 2024, API requests accounted for 57% of dynamic internet traffic around the globe, according to the Cloudflare 2024 API...
Read more →At Help Net Security, we’ve been following the cybersecurity business landscape closely for the past 25 years. Through our Industry...
Read more →TruffleHog is an open-source scanner that identifies and addresses exposed secrets throughout your entire technology stack. “TruffleHog was originally a...
Read more →