The latest edition of the ISMG Security Report describes vulnerabilities found in popular password generator apps. Plus, the evolution of blockchain as a utility and a new decryptor for GandCrab ransomware.
Good news for many victims of GandCrab: There's a new, free decryptor available from the No More Ransom portal that will unlock systems that have been crypto-locked by the latest version of the notorious, widespread ransomware. But the ransomware gang appears to already be prepping a new version.
Britain's intelligence establishment has reportedly concluded that any risks posed by Chinese-built Huawei networking equipment used as part of the country's 5G rollout can be minimized if the process is appropriately managed.
As the use of artificial intelligence tools and robotics continues to grow, it's crucial for organizations to assess the potential security risks posed, says attorney Stephen Wu, who reviews key issues in an interview.
In Forrester's evaluation of the emerging market for
enterprise container platform (ECP) software suites,
we identified the eight most significant providers in
the category - Docker, IBM, Mesosphere, Pivotal,
Platform9, Rancher Labs, Red Hat, and SUSE -
and evaluated them. This report details our findings
Digital transformation is causing businesses to move faster in the digital realm, driving a wave of technology change. Companies are migrating to the public cloud to take advantage of on-demand resources and implementing DevOps and microservices architectures to increase application development speed.
Microsoft is ending its extended support for Windows Server 2008 and Windows Server 2008 R2 on January 14, 2020, which is not that far off. January 2020 is barely a year away. That does not leave a lot of time for IT pros to come up with a strategy for migrating applications away from Windows Server 2008, and on to a...
Today's economy is one of constant change. New opportunities, competitors and
risks emerge regularly. To stay competitive and capitalize on new opportunities in the digital economy, every
organization needs to shift to an agile and innovative mindset. That means rethinking
how companies operate, changing processes...
What if organizations' information security practices have gotten so good that they're finally repelling cybercriminals and nation-state attackers alike? Unfortunately, the five biggest corporate breaches of the past five years - including Yahoo, Marriott and Equifax - suggest otherwise.
Red Hat, Amazon and Google have issued fixes for a serious container vulnerability. The flaw in the "runc" container-spawning tool could allow attackers to craft a malicious container able to "break out" and gain root control of a host system, potentially putting thousands of other containers at risk.
The Trump administration is leading a broadside against Chinese telecommunications giants Huawei and ZTE. But concerns that Chinese networking gear could be used as backdoors for facilitating state-sponsored surveillance or disrupting critical infrastructure are not limited to America.
Singapore's Infocomm Media Development Authority has issued a new consultation paper with an aim to instill greater confidence in the use of IoT systems. But some security experts say the report comes up short, with cybersecurity recommendations that are too generic.
Apple has issued an iOS update that patches two flaws being exploited in the wild by attackers as well as the "FalmPalm" bug in Group FaceTime. Apple says it compensated the teenager who reported the FaceTime flaw and gave him an extra gift toward his tuition.
Recent data leaks, including the SBI incident that affected millions of customers, have once again stirred up a debate on the role of auditors in cybersecurity. But a bigger issue is the need to invest in appropriate security technologies and implement stronger policies and awareness programs.
Many security professionals are constantly drowning in alerts across a multitude of security tools. When you can't see what is happening on your endpoints, investigating an alert can feel like you're running blindfolded. Often, these professionals don't have the visibility or data to prioritize alerts or make...