Inadequate and ineffective technologies are often the culprit behind the failure of compliance mandates and initiatives for many organizations. Vulnerabilities can be a challenge for organizations to manage, but identifying the weaknesses and the threats businesses face with information in a state of constant flux is not something to be ignored.

Cybersecurity Live - Boston

Cybersecurity incidents and the threat information associated with them may change as information unfolds, similar to Positive technologies’ latest findings regarding the Citrix vulnerability risk possibly affecting 80,000 companies in 158 countries. This number is not reflective of individuals; rather, it represents companies. Though the vulnerability exposing the email address and location for the 250 million records of Microsoft customer support and service records has been patched, and the exposure was less than 48 hours, the vulnerability exposed a window of risk.

Cloud computing continues to increase in market share, and many are left to wonder (Read more...)