Severe Auth Bypass and Priv-Esc Vulnerabilities Disclosed in OpenBSD

Severe Auth Bypass and Priv-Esc Vulnerabilities Disclosed in OpenBSD OpenBSD, an open-source operating system built with…

Face scanning – privacy concern or identity protection?

Face scanning – privacy concern or identity protection? What issues would face scanning attached to a…

G Suite admins get restricted security code option

G Suite admins get restricted security code option Earlier this year, Google provided G Suite…

ZeroCleare: New Iranian Data Wiper Malware Targeting Energy Sector

ZeroCleare: New Iranian Data Wiper Malware Targeting Energy Sector Cybersecurity researchers have uncovered a new, previously…

Avoiding the next breach: Four tips for securing your apps

Avoiding the next breach: Four tips for securing your apps As security incidents continue to…

The rise of continuous crowdsourced security testing for compliance

The rise of continuous crowdsourced security testing for compliance A large percentage of organizations and…

2020 predictions: Rising complexity of managing digital risk

2020 predictions: Rising complexity of managing digital risk Digital risk management experts at RSA Security…

CPoC: New data security standard for contactless payments

CPoC: New data security standard for contactless payments The PCI Security Standards Council (PCI SSC)…

How do SMBs plan to improve their security posture in 2020?

How do SMBs plan to improve their security posture in 2020? With cybersecurity concerns already…

AWS launches three new services and capabilities to help customers build and operate securely

AWS launches three new services and capabilities to help customers build and operate securely Amazon…