Security News

The Three Great Threats to Modern Civilization
2018-04-12 08:44

There are three main threats to our modern civilization that could cause humanity to go the way of the ancient Mayans.

How to minimize healthcare supply chain threats
2018-04-10 12:42

There are many reasons why healthcare institutions have poor cybersecurity: most resources go towards providing patient care and not enough is left for cybersecurity; not all hospitals have a...

Critical Infrastructure Threat Is Much Worse Than We Thought
2018-04-10 12:27

Adversaries Most Likely Want to Acquire a “Red Button” Capability That Can be Used to Shut Down the Power Grid read more

Gmail is secure. Netflix is secure. Together they're a phishing threat
2018-04-10 07:02

Google doesn't recognise dots in email addresses, which creates an opportunity for evil A developer has discovered that Gmail's email handling creates a handy phishing vector to attack Netflix customers.…

2020 Vision: How to Prepare for the Future of Information Security Threats
2018-04-06 17:25

A highlight of the top nine threats to information security over the next two years.

5 common browser security threats, and how to handle them
2018-04-06 13:20

Web browsers are designed to store information for your convenience, but that information can also fall into the wrong hands. Here are some simple tips for preventing that situation.

WAF Security Startup Threat X Raises $8.2 Million
2018-04-04 13:59

Cybersecurity startup Threat X, which offers cloud-based web application firewall (WAF) solutions, today announced that it has closed an $8.2 million Series A funding round.  The Denver,...

How companies continue to expose sensitive data to threats
2018-04-04 12:00

A new study from the Varonis Data Lab found that on average, 21% of a company’s folders were accessible to every employee, and 41% of companies had at least 1,000 sensitive files open to all...

The Road to Actionable Threat Intelligence
2018-04-04 02:14

Processing and parsing intelligence from all sources - external and internal, structured and abstract - across three important categories is essential to a proactive, predictive threat...

Are legacy technologies a threat to EU’s telecom infrastructure?
2018-04-03 12:00

Telecommunications is a key infrastructure based on how our society works. It constitutes the main instrument that allows our democracy and our EU core values such as freedom, equality, rule of...