Vulnerability: Page 26
-
Proactive technology upgrades prevent security nightmares, report finds
Successful enterprises stay one step ahead of bad actors, retain talent and get support from top company executives.
By David Jones • Dec. 1, 2020 -
Sharp rise in IT spending as cyberthreats evolve, Crowdstrike finds
Companies had to evolve as legacy security systems, including firewalls and antivirus software, fell short during the pandemic.
By David Jones • Nov. 25, 2020 -
Companies exposed to unnecessary risk from missed patches, report finds
As vendor services become more cloud-based, companies are navigating a minefield of software patches.
By Samantha Schwartz • Nov. 24, 2020 -
Why does industry say there are air gaps between IT and OT?
Not only is OT connected to the internet now, cyberattacks can trickle through IT environments.
By Samantha Schwartz • Nov. 16, 2020 -
Voice, SMS not secure enough for multifactor authentication, Microsoft says
SMS and voice are based on publicly switched telephone networks (PSTN) and are the least secure options for MFA, said Microsoft's Alex Weinert.
By David Jones • Nov. 16, 2020 -
Retrieved from Facebook on August 20, 2020
Cisco issues patch to address high-severity Webex vulnerability
The app within the HVD requires patching, Cisco said. A successful exploitation could lead to arbitrary code execution through user privileges.
By Samantha Schwartz • Nov. 5, 2020 -
Ryuk is challenging traditional 'find a flaw, fix a flaw' strategy
There is no universal solution for ransomware prevention, and even simulated phishing campaigns for employee awareness and deterrence fall short.
By Samantha Schwartz • Nov. 4, 2020 -
Deep Dive
Ransomware 2020: the scale, scope and impact of attacks on business
In an international health crisis ripe with economic volatility, ransomware attacks have remained persistent. The fallout is growing more costly.
By Samantha Schwartz • Oct. 30, 2020 -
Sue Gordon, former principal deputy director of national intelligence, speaking during a keynote speech at the Gartner IT Symposium/Xpo Americas. Retrieved on Oct. 27, 2020
Weakened digital borders, information sharing spotlight vulnerabilities
The COVID-19 pandemic exposed how interconnected global IT systems are. Now, it's on every organization to keep its partners safe from cyberthreats.
By Katie Malone • Oct. 27, 2020 -
Security experts overlook attacker-favored credential stuffing
With an endless cycle of breaches, hackers have a large pool of exposed credentials to throw at websites, increasing their probability of success.
By Samantha Schwartz • Sept. 30, 2020 -
Retrieved from Zoom on April 03, 2020
Following scrutiny, Zoom enables end-to-end encryption to all users
Available as technical preview, the feature uses 256-bit AES-GCM encryption, the same encryption used by default in meetings.
By Samantha Schwartz • Updated Oct. 27, 2020
To find more content, use the "Topics" in the menu above.