“Secure as the weakest link.” I hear that a lot, but your security model should not fall apart just because a part of your business, or a business partner, has weak security.... Read more »
Emotet’s commanding position at the top of the malware threat charts seems as unassailable now as Bryan Adams’ record-breaking run at the top of the UK singles charts seemed in the long,... Read more »
A series of eight newly designated common vulnerabilities and exposures (CVEs) in a building access control system built by HID Mercury and sold by Carrier – a global supplier of building systems... Read more »
Developing applications using open source components provides the architectural building blocks to accelerate digital transformation. But as it matures in the enterprise, IT leaders need to grasp the mindset shift that goes... Read more »
Sudhakar Ramakrishna, the CEO of SolarWinds, has used a panel appearance at the annual RSA Conference in San Francisco, California, to call for increased cooperation and collaboration between government and industry on... Read more »
Sudhakar Ramakrishna, the CEO of SolarWinds, has used a panel appearance at the annual RSA Conference in San Francisco, California, to call for increased cooperation and collaboration between government and industry on... Read more »
Industry trade association TechUK has published a report calling on the government and industry to work closely together on digital identity, setting out 10 steps it believes are urgently needed to deliver... Read more »
Ahead of the final Patch Tuesday, which true to precedent is due on Tuesday 14 June, analysts at Recorded Future are stepping into the breach, launching a monthly report that will detail... Read more »
Long-standing vulnerabilities in popular consumer and home office Wi-Fi routers made by the likes of Cisco, D-Link, Netgear and ZyXel are being routinely exploited by threat actors backed by the Chinese government... Read more »
Mass exploitation of the ProxyLogon and ProxyShell vulnerabilities in Microsoft Exchange Server by so-called initial access brokers (IABs) seems to have driven a substantial increase in median dwell times, which rose by... Read more »