
MITRE CVE database saved after last minute reversal
The US government is extending funding for the Common Vulnerabilities and Exposures (CVE) database by eleven ...
The US government is extending funding for the Common Vulnerabilities and Exposures (CVE) database by eleven ...
Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Thales and Gemalto have obtained approval from the Committee on Foreign Investment in the United States (CFIUS...
Kaspersky Lab announces the Kaspersky Security Cloud, a service for consumers that allows them to scale up sec...
More than a quarter of the top people, 27 percent, think that investments in security have a negative return o...
Schneider Electric has shipped USB sticks that may contain malware. These USB sticks were shipped with Conext ...
A hack on British Airways put 380,000 payment cards at risk. The hack took place between 21 August and 5 Septe...
Fortinet has made the new FortniNAC solution available. It is a network access controller that combines networ...
Uniform Resource Locators (URLs), the online addresses that are a bit like one of the most important ways of s...
People remain the weak link in any security system. A new investigation has shown that the vast majority of se...
According to Czech security researcher VladimÃr Smitka, almost 400,000 websites are at risk of being hacked...
Attackers increasingly use legitimate tools or run simple scripts and shell code directly in memory. These liv...