How do DevSecOps professionals feel about security becoming an around the clock job?

As breaches continue to rise, cybersecurity and development professionals are feeling the pressure to maintain their organizations’ security postures. Invicti Security released a report unveiling how developers and security professionals are overworked and understaffed, yet prideful of their roles within their organizations. Conducted in partnership with Wakefield Research, the report is based on a survey […]

Continue Reading

Kali Linux 2022.2 released: Desktop enhancements, tweaks for the terminal, new tools, and more!

Offensive Security has released Kali Linux 2022.2, the latest version of its popular penetration testing and digital forensics platform. Cosmetic changes Kali Linux 2022.2 comes with: A new version of the GNOME desktop environment, for “a more polished experience” A design and usability improvement for the KDE Plasma graphical workspaces environment Several tweaks for the […]

Continue Reading

Why cyber security can’t just say “no“

There was a time, not long ago, when there were only so many ways of accomplishing an information technology task. Whether you were building a website, setting up a new computer, or installing a piece of software, your options were limited — if there were any options at all. That time is over. Now, any […]

Continue Reading

Remote work hazards: Attackers exploit weak WiFi, endpoints, and the cloud

Infoblox unveils a global report examining the state of security concerns, costs, and remedies. As the pandemic and uneven shutdowns stretch into a third year, organizations are accelerating digital transformation projects to support remote work. Meanwhile, attackers have seized on vulnerabilities in these environments, creating more work and larger budgets for security teams. 1,100 respondents […]

Continue Reading

Best practices for healthcare delivery organizations to manage supply chain cybersecurity risks

The Cloud Security Alliance (CSA) released a paper titled Healthcare Supply Chain Cybersecurity Risk Management. Drafted by the Health Information Management Working Group, the report provides best practices that healthcare delivery organizations (HDOs) can use to manage the cybersecurity risks associated with their supply chains. HDOs face risks from many different types of supply chain […]

Continue Reading

The most insecure and easily hackable passwords

No matter how annoying juggling too many passwords can be, for better or worse they are one thing end users have control over. But while choosing a password is easy, choosing one that will be easy to remember and good enough to withstand attackers’ guessing, bruteforcing and cracking efforts is obviously a problem for many […]

Continue Reading

Recovering from a cybersecurity earthquake: The lessons organizations must learn

It’s been over a year since the SolarWinds supply chain hack sent shockwaves through thousands of organizations worldwide, but this cybersecurity earthquake is by no means over. More recently we’ve seen aftershocks fueled by the Log4Shell and Spring4Shell vulnerabilities, which impacted organizations using the Log4j library and the Spring Core framework. We had seen supply […]

Continue Reading