Vulnerabilities

Trend Micro’s ‘Virtual Patching’ to help protect enterprises against advanced cyberattacks

A non-disruptive approach to security, without deploying in-guest security agents.

What is DevSecOps and why should your business care?

Although tacking on another three letters to the already heavily abbreviated 'devops' has the uncomfortable aura of word soup, 'devsecops' is a logical, essential continuation of the devops mindset.

Widespread vulnerabilities in mobile point-of-sale readers

Security researchers uncovered widespread vulnerabilities in mobile point-of-sale readers offered by Square, SumUp, PayPal and iZettle.

Pune-based Cosmos Bank loses Rs 94 crore to hackers

A malware attack helped hackers clone thousands of debit cards and siphon off over ₹94 crore from Cosmos Bank over a period of two days.

How CIOs should respond to a data breach

How prepared is your organisation to deal with the fallout from a cyber attack?

Why you should consider crowdsourcing IT security services

Whether you need a pentesting team, a bug bounty program, or a vulnerability disclosure plan, several crowdsourcing platforms can take the risk and pain from the process.

Do you need a vulnerability disclosure program? The feds say yes

The FTC and DOJ are pushing companies to provide a means for good-faith security researchers to report bugs and put effective processes in place to act on those reports.

Partner Content
Email-borne cyber attacks: A constant security threat

The sheer widespread usage of e-mails, both on a personal and on a professional basis by sheer billions of people, means hackers and cyber criminals can target multiple people at once.

Partner Content
POS security vulnerabilities for retail industry

One of the most publicized POS breaches happened with American retailer, Target in 2013 where 41 million customer payment card accounts and contact information for more than 60 million Target customers were affected.

By 2020, 1-in-5 healthcare orgs will adopt blockchain; here’s why

Blockchain lets the healthcare industry exchange data in a standard format, automate complex processes and apply AI against large silos of medical data. It might even allow patients to sell their data for rewards.

Partner Content
3 Common Problems in Vulnerability Management

Vulnerability management is a key process in any information security program and regulatory compliance framework. Why is it that many companies lag behind on patches and updating their systems?

Partner Content
7 Pro Tips for Vulnerability Management

Managing vulnerabilities in an organization's network is often an overwhelming job that's never done. But with the help of automation and with proper prioritization, security teams can stay on top of the task.