Security
Headlines
HeadlinesLatestCVEs

Source

DARKReading

Outlining Risks to the World's Vital Cyber-Physical Systems

The key to protecting these systems is not only to ensure the control environment is secure and protected but also to deploy emerging technologies such as confidential computing.

DARKReading
Nearly 50% of On-Premises Databases Have Vulnerabilities

A network compromise shouldn't mean "game over" for corporate data, but survey data shows many companies fail to protect their crown jewels.

DHS Secretary Mayorkas Headlines Billington Cybersecurity Summit

DHS Secretary Mayorkas joins 130+ cyber experts at Billington Cybersecurity Summit that explores ransomware, 5G, zero trust, and more.

Magecart: How Its Attack Techniques Evolved

Shape-shifting Magecart has shown itself to be highly adaptable in its ability to compromise third-party websites, especially during the pandemic.

Security Fears & Remote Work Drive Continued 2FA Adoption

Seventy-nine percent of people used two-factor authentication at least once in 2021, with 72% regularly using the technology, as remote work, social media, and online retail spur demand.

Brute-Force Attacks, Vulnerability Exploits Top Initial Attack Vectors

A new analysis emphasizes how most security incidents can be avoided with strong patch management and password management policies.

More Than 10,000 Cybersecurity Professionals Have Earned the (ISC)2 CCSP Cloud Security Certification

CCSP certification validates comprehensive vendor-neutral cloud security expertise, as demand for proven talent for protecting data and cloud infrastructure intensifies.

Executives' Ransomware Concerns Are High, but Few Are Prepared for Such Attacks

The vast majority (86.7%) of C-suite and other executives say they expect the number of cyberattacks targeting their organizations to increase over the next 12 months, according to a recent Deloitte poll.

Apple Patches Zero-Days in iOS 14.8 Update

An important security update addresses vulnerabilities in CoreGraphics and WebKit that may have been actively exploited.

Constructive Complaints: 5 Ways to Transform Problems Into Plans

Working in infosec has its challenges, and it's easy enough to complain about them. But that won't solve anything.