News
-
"Accenture: Utility Grids Brace for Cyberattacks—with Poor Defenses"A report has been released by Accenture, titled “Outsmarting Grid Security Threats”, that shares the results of a survey in which 100 utility executives from around the world responded to. The results of this survey indicate that many countries are…
-
"66 Percent of SMBs Say a Cyber Attack Would Shut Them Down"A recent survey conducted by VIPRE Security indicates that many small and midsize businesses (SMBs) would temporarily or permanently cease operations due to a lack of adequate security practices. The survey reveals the insufficiency of security practices…
-
"Spear-Phishers Hijack In-Progress Conversation in Highly-Targeted Attack"Security researchers at Palo Alto have discovered a spear-phishing campaign in which a bank based in the Middle East, an international sporting organization, certain individuals with ties to a Northeast Asian country, as well as Europe-based trademark…
-
"Four Ways to Empower Your Employees through Security Awareness Training"For IT professionals, creating and implementing a flawless cybersecurity plan is the ideal situation. However, due to lack of resources, companies focus more on implementing sound processes and policies rather than the human error of their employees.…
-
“Cyber Risks Loom for Energy Sector”Cyberattacks pose the greatest threat to the U.S. energy sector as indicated by an upcoming Energy Department report in which the relative hazards and impacts of natural disasters and cyberattacks are compared. The U.S. has been urged by the White House…
-
"Cloud Vulnerabilities Are Being Ignored by the Enterprise"An annual report on cloud security has been released by RedLock, which indicates that security practices pertaining to the use of cloud services are still being overlooked by many organizations. According to the report, many organizations that use …
-
“Mini Crypto Chip Is a Self-Contained Encryption Engine”The Mini Crypto Chip is an independent encryption engine used by the Air Force to protect communications and sensitive data transmitted between systems from the interception of adversaries. Mini Crypto has been designed to be physically small and easy to…
-
“Google Reveals Critical Flaws In Dnsmasq Software Packages”Google security researchers have discovered seven different critical security vulnerabilities within the Dnsmasq software package, which largely impacts millions of Android phones, home routers, desktops, and other IoT devices. Dnsmasq is an open-source…
-
“DHS Cyberinsurance Research Could Improve Security”The Department of Homeland Security (DHS) is conducting research to discover the potential improvements of cybersecurity that would be provided by cyberinsurance. Research is being performed through the collection of breach data into DHS’s Cyber Incident…
-
"5 IT Practices That Put Enterprises at Risk"Although there is no single solution or method to completely safeguard organizations from cyberthreats as such threats continue to grow in sophistication, there are five IT practices that companies could avoid in order to improve upon their security…
-
“Woefully Inadequate IT Processes for Managing User Accounts and Access Continue to Create Major Security and Compliance Risks”Findings of a study conducted by Dimensional Research and released by One Identity indicate significant inadequacies in the management of user accounts by organizations, which pose great risks to security and compliance. The survey reveals the…
-
“New Research Details the Privacy Implications of Email Tracking”A study conducted by researchers at Princeton University highlights the extensiveness of email tracking and how this form of snooping could significantly impact the privacy of users. According to researchers, most emails are embedded with third…