Economic uncertainty compels IT leaders to rethink their strategy
30
Dec
2022

Economic uncertainty compels IT leaders to rethink their strategy

IT decision makers’ priorities have shifted over the past 12 months and their top areas of focus as they head…

Managing the Evolving Cyber Risk Posed by Third Parties
30
Dec
2022

Managing the Evolving Cyber Risk Posed by Third Parties

As major cyber incidents involving vendors surge, healthcare entities must carefully and continuously scrutinize the security practices of their third-party…

How does red teaming test the ultimate limits of cyber security?
30
Dec
2022

How does red teaming test the ultimate limits of cyber security?

Hacking can be a dirty word. It evokes images of a person sitting in the dark with a black hoodie…

30
Dec
2022

Gatekeeper bypass exposes Macs to malware – Security

Microsoft has gone public with an analysis of a mac OS Gatekeeper bug it discovered in July, dubbed Achilles, following…

Hackers Allegedly Hit JFK Airport … Taxis
30
Dec
2022

Hackers Allegedly Hit JFK Airport … Taxis

Cybercrime , Fraud Management & Cybercrime Russians Accused of Aiding Drive to Use Malware to ‘Hack the Taxi Industry’ Mathew…

Cyber security professionals share their biggest lessons of 2022
30
Dec
2022

Cyber security professionals share their biggest lessons of 2022

The past 12 months have been a trying time for cyber security professionals globally. Most notably, they’ve had to contend…

30
Dec
2022

Researchers find new ‘ProxyNotShell’ Exchange exploit – Security

Security researchers have found a new exploit that allows attackers to remotely execute code through Outlook Web Access (OWA), on…

Unpatched Citrix Servers
30
Dec
2022

Thousands of Unpatched Citrix Servers Vulnerable to Critical Flaws

Two critically important security vulnerabilities that Citrix fixed in recent months, still remain vulnerable on thousands of Citrix gateways and…

Understanding how weaponized template injection attacks operate
30
Dec
2022

Understanding How Weaponized Template Injection Attacks Operate

By Brett Raybould, EMEA Solutions Architect, Menlo Security Malicious payloads are one of the leading challenges facing organizations today. From…

Understanding the Top Operational Technology Security Needs and Methods in the Utilities Sector
30
Dec
2022

Understanding the Top Operational Technology Security Needs and Methods in the Utilities Sector

By Dominick Birolin, CISSP, CISA, NSE4 When it comes to finding and keeping the specialists necessary to defend an organization…

The Troublemaker CISO: Laziness, Failure, Great Expectations
30
Dec
2022

The Troublemaker CISO: Laziness, Failure, Great Expectations

Incident & Breach Response , Leadership & Executive Communication , Security Operations Security Director Ian Keller Rants About Bad Coding…

How Finland develops its national plan for investment in innovation
30
Dec
2022

How Finland develops its national plan for investment in innovation

In 2021, Finland set a goal of raising its expenditure on research, development and innovation (RDI) to 4% of GDP…