Vulnerability: Page 26


  • Proactive technology upgrades prevent security nightmares, report finds

    Successful enterprises stay one step ahead of bad actors, retain talent and get support from top company executives.

    By Dec. 1, 2020
  • Illustration of locks layered above circuity.
    Image attribution tooltip
    Traitov/iStock/Getty via Getty Images
    Image attribution tooltip

    Sharp rise in IT spending as cyberthreats evolve, Crowdstrike finds

    Companies had to evolve as legacy security systems, including firewalls and antivirus software, fell short during the pandemic. 

    By Nov. 25, 2020
  • Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Companies exposed to unnecessary risk from missed patches, report finds

    As vendor services become more cloud-based, companies are navigating a minefield of software patches.

    By Samantha Schwartz • Nov. 24, 2020
  • Why does industry say there are air gaps between IT and OT?

    Not only is OT connected to the internet now, cyberattacks can trickle through IT environments.

    By Samantha Schwartz • Nov. 16, 2020
  • Image attribution tooltip
    Kendall Davis/Cybersecurity Dive
    Image attribution tooltip

    Voice, SMS not secure enough for multifactor authentication, Microsoft says

    SMS and voice are based on publicly switched telephone networks (PSTN) and are the least secure options for MFA, said Microsoft's Alex Weinert.

    By Nov. 16, 2020
  • WebEx on Portal
    Image attribution tooltip
    Retrieved from Facebook on August 20, 2020
    Image attribution tooltip

    Cisco issues patch to address high-severity Webex vulnerability

    The app within the HVD requires patching, Cisco said. A successful exploitation could lead to arbitrary code execution through user privileges.

    By Samantha Schwartz • Nov. 5, 2020
  • Ryuk is challenging traditional 'find a flaw, fix a flaw' strategy

    There is no universal solution for ransomware prevention, and even simulated phishing campaigns for employee awareness and deterrence fall short.

    By Samantha Schwartz • Nov. 4, 2020
  • Image attribution tooltip
    Danielle Ternes/Cybersecurity Dive
    Image attribution tooltip
    Deep Dive

    Ransomware 2020: the scale, scope and impact of attacks on business

    In an international health crisis ripe with economic volatility, ransomware attacks have remained persistent. The fallout is growing more costly.

    By Samantha Schwartz • Oct. 30, 2020
  • Sue Gordon speaking at Gartner IT Symposium/Xpo
    Image attribution tooltip

    Sue Gordon, former principal deputy director of national intelligence, speaking during a keynote speech at the Gartner IT Symposium/Xpo Americas. Retrieved on Oct. 27, 2020

    Image attribution tooltip

    Weakened digital borders, information sharing spotlight vulnerabilities

    The COVID-19 pandemic exposed how interconnected global IT systems are. Now, it's on every organization to keep its partners safe from cyberthreats.

    By Oct. 27, 2020
  • Image attribution tooltip
    Getty
    Image attribution tooltip

    Security experts overlook attacker-favored credential stuffing

    With an endless cycle of breaches, hackers have a large pool of exposed credentials to throw at websites, increasing their probability of success. 

    By Samantha Schwartz • Sept. 30, 2020
  • Zoom
    Image attribution tooltip
    Retrieved from Zoom on April 03, 2020
    Image attribution tooltip

    Following scrutiny, Zoom enables end-to-end encryption to all users

    Available as technical preview, the feature uses 256-bit AES-GCM encryption, the same encryption used by default in meetings. 

    By Samantha Schwartz • Updated Oct. 27, 2020