Threats & Breaches

4 Tips for End-to-end Passwordless Authentication for Hybrid Deployments

Most applications are still protected only by passwords that are prone to man-in-the-middle and phishing attacks, increased operational costs, and…

2 weeks ago

84% of Companies Have High Risk Vulnerabilities

A recent study from Positive Technologies found that 84% of companies have high risk vulnerabilities that are accessible on the…

2 weeks ago

Advisory for D-Link VPN Router Vulnerabilities

The post Advisory for D-Link VPN Router Vulnerabilities appeared first on Digital Defense, Inc..

2 weeks ago

The Dangers of Security Vulnerability Scoring Dependency

Article by Nathan King, Director, CyberisVulnerability scoring has an important role in most enterprise threat and vulnerability management programmes because…

2 weeks ago

Digital Defense, Inc. Discloses Zero-Day Vulnerabilities in D-Link VPN Routers

The post Digital Defense, Inc. Discloses Zero-Day Vulnerabilities in D-Link VPN Routers appeared first on Digital Defense, Inc..

2 weeks ago

Mercy Health Fired Employee Responsible for Insider Breach

Mercy Health revealed that it had fired an employee who was responsible for an insider breach involving its systems. On…

2 weeks ago

4 Things a Good Vulnerability Management Policy Should Include

Organizations face an ever-evolving threat landscape. With this in mind, it is imperative that organizations keep an up-to-date vulnerability management…

2 weeks ago

The Top 19 Internet of Things(IoT) Security Solutions

For years, smartphones have been the epicenter of innovative technology. Is the torch being passed to IoT? If you ask…

2 weeks ago

Healthcare Data Breaches to Triple in 2021

A new report by Black Book Market Research predicts that data breaches in the healthcare industry are likely to triple…

2 weeks ago