Security News

The Ultimate DSPM Guide: Webinar on Building a Strong Data Security Posture
2024-10-18 11:25

Picture your company's data as a vast, complex jigsaw puzzle—scattered across clouds, devices, and networks. Some pieces are hidden, some misplaced, and others might even be missing entirely....

Despite massive security spending, 44% of CISOs fail to detect breaches
2024-10-18 04:30

Despite global information security spending projected to reach $215 billion in 2024, 44% of CISOs surveyed reported they were unable to detect a data breach in the last 12 months using existing...

Microsoft warns it lost some customer's security logs for a month
2024-10-17 22:17

Microsoft is warning enterprise customers that, for almost a month, a bug caused critical logs to be partially lost, putting at risk companies that rely on this data to detect unauthorized activity. [...]

Vendor Comparison: DIY Home Security Systems
2024-10-17 16:00

Attention remote workers! When it comes to DIY home security, there are many systems and components to consider and many decisions to make. This vendor comparison guide, created by Mark W. Kaelin...

Top 5 Cloud Security Automations for SecOps Teams
2024-10-17 14:02

Learn about 5 powerful cloud security automations with Blink Ops to simplify security operations like S3 bucket monitoring, subdomain takeover detection and failed EC2 login detection. [...]

5 Ways to Reduce SaaS Security Risks
2024-10-17 10:19

As technology adoption has shifted to be employee-led, just in time, and from any location or device, IT and security teams have found themselves contending with an ever-sprawling SaaS attack...

WeChat devs introduced security flaws when they modded TLS, say researchers
2024-10-17 08:31

No attacks possible, but enough issues to cause concern Messaging giant WeChat uses a network protocol that the app's developers modified – and by doing so introduced security weaknesses,...

China’s infosec leads accuse Intel of NSA backdoor, cite chip security flaws
2024-10-16 18:30

Uncle Sam having a secret way into US tech? Say it ain't so A Chinese industry group has accused Intel of backdooring its CPUs, in addition to other questionable security practices while calling...

7 Security and Compliance Tips From ISC2 Security Congress
2024-10-16 18:26

An IT and security compliance analyst distilled seven ways to forge effective synergies between IT and broader business goals.

Hackers Abuse EDRSilencer Tool to Bypass Security and Hide Malicious Activity
2024-10-16 16:21

Threat actors are attempting to abuse the open-source EDRSilencer tool as part of efforts to tamper endpoint detection and response (EDR) solutions and hide malicious activity. Trend Micro said it...