New Report: Inside the High Risk of Third-Party SaaS Apps
| | | | | | | | | | | | | | | | | |

New Report: Inside the High Risk of Third-Party SaaS Apps

A new report from Adaptive Shield looks at the how volume of applications being connected to the SaaS stack and the risk they represent to company … See all articles in Insights

How to Erase Data Securely From Hard Drives and SSDs, Including NVMe
| | | | | | | | | | | | | | | | | | | |

How to Erase Data Securely From Hard Drives and SSDs, Including NVMe

Data is of utmost importance for businesses and consumers in today’s digital world. Everything from documents, emails, and passwords to financial … See all articles in Insights

Hardware With Built-In Security Could Be More Secure Than Software, Experts Say
| | | | | | | | | | | | | | | | | | |

Hardware With Built-In Security Could Be More Secure Than Software, Experts Say

If one of the leading reasons that help facilitate cyberattacks is weak, unpatched, outdated software, could a strong hardware-based security product … See all articles in Insights

SBOMs: What they are and why organizations need them
| | | | | | | | | | | | | | | | | |

SBOMs: What they are and why organizations need them

In the continuously rippling wake of cyberattacks, hacks and ransomware, organizations want — and need — to clean up their software supply chains. In this, they are increasingly turning to a valuable visibility tool: the software bill of materials (SBOM). As noted by the Cybersecurity and … See all articles in Insights

Password recovery tool infects industrial systems with Sality malware
| | | | | | | | | | | | | | | | | | |

Password recovery tool infects industrial systems with Sality malware

A threat actor is infecting industrial control systems (ICS) to create a botnet through password “cracking” software for programmable logic … See all articles in Insights

Hackers are targeting industrial systems with malware
| | | | | | | | | | | | | | | | | | |

Hackers are targeting industrial systems with malware

An entire ecosystem of sketchy software is targeting potentially critical infrastructure. From the what-could-possibly-go-wrong files comes this: An … See all articles in Insights

New to the cloud? Here are top tips for getting started
| | | | | | | | | | | | | | | | | |

New to the cloud? Here are top tips for getting started

This is your go-to resource for XaaS, AWS, Microsoft Azure, Google Cloud Platform, cloud engineering jobs, and cloud security news and tips. See all articles in Insights

Adobe Acrobat may block antivirus tools from monitoring PDF files
| | | | | | | | | | | | | | | | | | |

Adobe Acrobat may block antivirus tools from monitoring PDF files

Security researchers found that Adobe Acrobat is trying to block security software from having visibility into the PDF files it opens, creating a … See all articles in Insights

Challenges of securing a software supply chain
| | | | | | | | | | | | | | | | | |

Challenges of securing a software supply chain

A major area of concern for IT security teams is how to tackle the challenges posed by the increasing use of third-party platforms and services. The … See all articles in Insights

40% of enterprises don’t include business-critical systems in their cybersecurity monitoring – Help Net Security
| | | | | | | | | | | | | | | | | |

40% of enterprises don’t include business-critical systems in their cybersecurity monitoring – Help Net Security

Logpoint has announced findings from a recent poll to uncover the security and cost implications enterprises face with their existing IT … See all articles in Insights