In late 2021, the Apache Software Foundation disclosed a vulnerability that set off a panic across the global tech industry. The bug, known as Log4Shell, was found in the ubiquitous…
Browsing CategoryVulnerabilities
Old Habits Die Hard: New Report Finds Businesses Still Introducing Security Risk into Cloud Environments
While cloud computing and its many forms (private, public, hybrid cloud or multi-cloud environments) have become ubiquitous with innovation and growth over the past decade, cybercriminals have closely watched the…
The Next Frontier for Data Security: Protecting Data in Use
Tremendous progress has been made over the last several years to protect sensitive data in transit and in storage. But sensitive data may still be vulnerable when it is in…
Why We Need To Beat ‘Breach Fatigue’ — At Work and at Home
Data breaches come at such a fast pace that the public doesn’t seem to pay attention to the latest incidents, or they’re practically forgotten in a week — just in…
What the SEC Requires From Businesses After a Data Breach
Consumers have become wary of data breaches and the decreased safety of their personal information. However, the cost of a data breach is no longer only a matter of money…
August Patch Tuesday Fixes Critical IE, Important Windows Vulnerabilities Exploited in the Wild
The August batch of Patch Tuesday updates includes 120 updates for the Microsoft suite, with 17 fixes rated as Critical, and the remaining 103 ranked as Important.
The post August Patch Tuesday Fixes Critical IE, Important Windows Vulnerabilities Exploited in the Wild appeared first on .
Report: Cost of a Data Breach in Energy and Utilities
On average, the cost of a data breach rose by 10% from 2020 to 2021. The energy industry ranked fifth in data breach costs, surpassed only by the health care,…
Report: Cost of a Data Breach in Energy and Utilities
On average, the cost of a data breach rose by 10% from 2020 to 2021. The energy industry ranked fifth in data breach costs, surpassed only by the health care,…
What Happens to Information After a Data Breach?
We’ve grown accustomed to it by now — a few million accounts broken into here, another hundred million there. After a company data breach, what happens to all the data?…
Behavior Transparency: Where Application Security Meets Cyber Awareness
How can you tell when software is behaving strangely if you don’t know what the right behavior is? That’s an important question when it comes to threat actors. After all,…