SAP NetWeaver Application Server Java vulnerability can be exploited without authentication and lead to complete system takeover. Patch now.
Stories by Dan Swinhoe
Data breaches and security incidents are becoming increasingly costly.
A pharming attack aims to redirect victims’ web traffic away from the intended destination to a website controlled by threat actors.
Security is in an “all hands on deck” situation at the healthcare organisation as it pivots to a mostly remote working business.
Cyber criminals are taking advantage of the coronavirus crisis to spread malware, disrupt operations, sow doubt and make a quick buck.
Cyber security start-up companies use the RSA Conference to make their public debut. These are some of the more interesting start-ups coming out of stealth.
Whether or not security executives lose their jobs in the wake of a major incident, security failure should be seen as a learning opportunity.
Just like in regular business, cyber criminals have a cost of operation and a return on investment to worry about.
Hacks and data thefts, enabled by weak security, cover-ups or avoidable mistakes have cost these companies a total of nearly $1.45 billion and counting.
Hacks and data thefts, enabled by weak security, cover-ups or avoidable mistakes have cost these companies a total of nearly $1.23 billion and counting.
After outsourcing giant Wipro suffered a phishing incident, attackers used its email system to target the company’s customers. The breach demonstrates the dangers of supply chain and third party risk.
Much like customers, partners also require guidance on the key technologies and markets to pursue. Read the Channel Roadmap to build a blueprint for future success.