When you think of cybersecurity, art and beauty probably aren't the first things that come to mind. But if Trend Micro has its way that could be about to change.
The company has commissioned a number of artists to create what it calls The Art of Cybersecurity. This is a series of works based on security data, with the idea of shifting the perception of protecting systems from a burden, to something beautiful.
One of the biggest worries about someone gaining unauthorized access to your computer is that they can view and steal your data.
The CyberYozh security group has launched a product that protects your sensitive files, browser data and more, by taking the nuclear option of destroying it.
Vulnerabilities in open source code represent a risk for businesses, but the process of reporting them is cumbersome and that can leave software open to risk.
Without a standard for responsible disclosure, even those who want to disclose vulnerabilities responsibly can get frustrated with the process and turn to public lists or social media, where bad actors can easily find the details before fixes are created.
Researchers have uncovered a vulnerability in the SoftNAS Cloud data storage platform that could be used to gain access to the webadmin interface without valid user credentials.
Security technology company Digital Defense found the previously undisclosed vulnerability which arises if customers have not followed SoftNAS deployment best practices and have openly exposed SoftNAS StorageCenter ports directly to the internet.
Ransomware and other threats like adware and cryptominers are still a major threat to businesses. But smaller companies may be struggling to find the resources to combat them.
To address this problem Kaspersky Lab is today releasing the next generation of its free Kaspersky Anti-Ransomware Tool for Business.
According to a new study 91 percent of IT and security professionals feel vulnerable to insider threats, and 75 percent believe the biggest risks lie in cloud applications like popular file storage and email solutions including Google Drive, Gmail and Dropbox.
The report from SaaS operations management specialist BetterCloud also shows 62 percent of respondents believe the biggest security threat comes from the well-meaning but negligent end user.
Prioritizing vulnerabilities can be difficult if you don't know which ones are being actively exploited. The latest annual research from Recorded Future looks at the top vulnerabilities and which products they are targeting.
In 2018, the company observed more exploits targeting Microsoft products compared to Adobe ones. Eight out of 10 vulnerabilities exploited via phishing attacks, exploit kits, or RATs were targeting Microsoft products.
Medium-sized businesses now account for over 60 percent of US jobs, and are investing fast in technology, but they must ensure they have the skills and management in place to avoid falling behind.
A new study from Aruba looks at how mid-sized businesses around the world are currently adopting workplace technology,
Businesses increasingly understand that staying competitive means making smart use of their data. But a new survey from Syncsort finds that just nine percent of respondents say their organization is 'very effective' at getting value from data while 48 percent responded 'somewhat effective'.
Making data accessible to users across the enterprise is the third most cited IT challenge and only half call their organization effective in getting data insights to business users.
This month, Verizon announced its intention to increase its use of edge computing technology, having tested edge functions in its 5G network in Houston resulting in massively decreased network latency.
This move is another example of how new technologies will enable and extend digital transformation projects at the edge, and this is only the beginning.
There is a shortage of cybersecurity professionals and coupled with the exponential growth in web applications used within businesses and by consumers around the world, there's a growing risk of flaws being exploited.
To combat this problem penetration testing specialist Offensive Security is making its Advanced Web Attacks and Exploitation (AWAE) training available as an online course.
Following on from yesterday's story about eCommerce site Gearbest leaking customer data the company has issued an official response to ethical hacker Noam Rotem’s report.
It says that its own servers are secure but that, "external tools we use to temporarily store data" may have been accessed by others leading to security having been compromised.
Around 20 percent of Americans suffer from security fatigue and don’t trust anyone to protect their personal data according to a new study.
The research from hardware security company nCipher Security reveals that many people want more control over their personal data privacy and most want tighter controls on how others handle and safeguard their personal data.
The Zippyshare file hosting service is currently blocked for users in the UK. Anyone visiting the site will be presented with a '403: Forbidden' message when they try to access the site.
Users on a number of ISP forums are asking whether this is due to some blocking action on the part of service providers, but it appears that for some reason the site is blocking itself from UK IP addresses.