May 11, 2017 Microsoft Update Fixes Remote Code Execution Vulnerability 2 min read - The most recent Microsoft update addresses a flaw in the Microsoft Malware Protection Engine that could enable attackers to commit remote code execution.
May 11, 2017 UK, Netherlands Emerge as Growing Hotspots for Originating Cyberattacks 2 min read - More than half of the world's cyberattacks now originate from EMEA countries, with the Netherlands being ground zero for 38 percent of phishing scams.
May 10, 2017 Fatboy Ransomware Targets Users With Big Mac Index 2 min read - Fatboy ransomware recently added location-based pricing along with extra service for cybercriminals looking for ransomware-as-a-service.
May 9, 2017 SharePoint Users Worry That Poor Usage Puts Sensitive Data at Risk 2 min read - The majority of Microsoft SharePoint users are calling for better controls and safeguards for sensitive data, according to a recent study.
May 9, 2017 Get to Work With the QRadar App Editor 2 min read - The recently debuted QRadar App Editor can help users quickly and easily create a variety of apps to meet their business needs.
May 8, 2017 The Calm Before the Storm: Achieving GDPR Compliance Before It’s Too Late 2 min read - Companies in the EU and organizations that conduct business in the region must achieve GDPR compliance before the regulation takes effect next May.
May 8, 2017 Cybercrime: US Tops Priority, Europe Tops Production 2 min read - European cybercrime is on the rise, according to a recent ThreatMetrix report, with the number of attacks outpacing the U.S. for the first time.
May 8, 2017 Expert Advice from CBI: Securing Your Endpoint Landscape 2 min read - IBM BigFix Detect includes new features to help organizations bolster their endpoint management strategies and prevent high-profile data breaches.
May 5, 2017 How Will ‘New Collar’ Skills Impact the Cybersecurity Skills Gap? 2 min read - One way to close the skills gap is to recruit new collar professionals who possess the requisite skills, if not the degrees, to work in cybersecurity.
May 4, 2017 Nowhere to Hide: The Tor Browser Profiles Itself 2 min read - Security researcher Dr. Neal Krawetz reported that the Tor browser discloses details that could enable fraudsters to deduce individual use patterns.