The Marketplace
Home Page Banner

The Marketplace

Advisory & Consulting
Home Page Banner

Advisory & Consulting

Events Calendar
Home Page Banner

Events Calendar

CCME BYTE
Home Page Banner

CCME BYTE

LATEST NEWS

More than 685 million users may have been exposed to XSS attacks due to a flaw in Branch.io service used

Enterprise Risk Management (ERM) is the process of assessing risks to identify both threats to a company’s financial well-being and

Looking for hard numbers to back up your sense of what’s happening in the cybersecurity world? We dug into studies

Security Staffing Low in Midsized and Large Orgs One of the greatest security challenges for midsized to large organizations is

Introduction In 2016, researchers from the University of Illinois left 297 unlabelled USB flash drives around the university campus to

Security experts from Palo Alto Networks have collected evidence that links the recently discovered NOKKI malware to North Korea-Linked APT.

Malware Less Common in Q2, Still Top Attack Method Despite malware attacks becoming less common since Q1 2018, they are

Financial Sector Breaches Have Tripled Since 2016 US financial services firms suffered three-times more data breaches in the first six

Some common malware will attempt to gather information about its environment, such as public IP address, Language, and Location. System

Password Security Better, Still Poses Business Risk Today marks the start of National Cybersecurity Awareness Month (NCSAM), and LastPass by

Endpoint protection began life as signature-based antivirus programs sitting on endpoints themselves. Over the years, the science of endpoint protection

Threats are constantly evolving and, just like everything else, tend to follow certain trends. Whenever a new type of threat

This March, as Facebook was coming under global scrutiny over the harvesting of personal data for Cambridge Analytica, Google discovered

Security experts from Qihoo 360 NetLab spotted GhostDNS, a malware that already infected over 100K+ devices and targets 70+ different types

Earlier this year, I wrote about what security professionals need to do to prepare for the upcoming Google distrust deadline. I

Torii – you might not have heard the name yet, but this new botnet has advanced techniques and persistence and

According to malware researchers from Proofpoint, DanaBot attackers launched a new campaign aimed at banks in the United States. A couple

Experts at the Cybaze Z-Lab have analyzed the latest iteration of the infamous GandCrab ransomware, version 5.0. Malware researchers at

 
 

IT Security

IAM definition Identity and access management (IAM) in enterprise IT is about defining and managing the roles and access privileges

Symantec introduced Email Threat Isolation, a new solution targeting to protect users against spear phishing, credential theft, account takeover and

Dell EMC unveiled its latest Integrated Data Protection Appliance (IDPA), the Dell EMC IDPA DP4400, providing simple and powerful converged

TELECOM SECURITY

IoT Devices at a Risk

Security researchers at Senrio, an IoT focused security firm, have a discovered a stack buffer overflow vulnerability (CVE-2017-9765) in an

News of the second Kmart credit-card breach in three years at the retailer and the number of breaches at financial

VoIP, short for Voice over Internet Protocol, allows businesses to make free, or very low-cost, telephone calls over the Internet.

Industrial & OT Security

Nearly 60% of surveyed organizations using SCADA or ICS reported they experienced a breach in those systems in the last

Microsoft last week unveiled Trusted Cyber Physical Systems (TCPS), a new solution designed to help protect critical infrastructure against modern

Kaspersky-OS

On a day by day basis do IOT (Internet of Things) and SCADA become more integrated in our lives. However,

CLOUD SECURITY

Hewlett Packard Enterprise is looking to realign channel partners in Europe around the cloud and shift their mindset from selling

New AES-256 encryption for data at rest, more efficient storage APIs and a revamped Storage Explorer app are among Azure

Citing sources familiar with Apple’s plans, The Wall Street Journal on Tuesday reported that while preparations for a more secure

 


____________________________________________________

Sign up for our newsletter and get access to our latest cyber security news, industry through-leadership, latest information about security products and solution, security conferences and events.

Email address
Secure and Spam free...