The Finland-based security consultancy discovered vulnerabilities affecting over 150 different HP multifunction printer products. Attackers can exploit the flaws to seize control of devices, steal information, and further infiltrate networks to inflict other types of damage, according to F-Secure's ...

Linux Foundation Research and SODA Foundation have released study results on new data and storage trends for enterprise. The 2021 Data and Storage Trends Report reveals enterprise use of data and storage as it relates to cloud services and workloads in the era of cloud native, edge, IoT and 5G. Data...

Businesses are flocking to software-as-a-service applications as a means to improve the efficiency of their operations and the productivity of their employees, but weak control of access to cloud apps is putting the data of many organizations at risk. According to a study by DoControl, the average 1...

Disruptions to power grid systems can have devastating effects. Despite the fact that consistent electric power has been a basic human need for more than a century; more than ever, the grid faces a growing onslaught of threats. We spoke with experts in the field about the critical nature of the grid...

Hackers aren't the only ones evading security measures of many organizations. So are their remote workers. In a new report on remote workforce security, 52 percent of the U.S. IT and cybersecurity professionals surveyed revealed they experienced remote workers finding workarounds to their organizati...

Even as operations as diverse as factories and hospitals are moving at least portions of their daily computational processes out of the centralized cloud and into various edges, edge computing for many people remains a mysterious concept. To provide some clarity and insight, we spoke with several ex...

A configuration error in the systems of content delivery provider Fastly knocked out numerous large websites and apps around the globe Tuesday. The event served up a reminder of how distributed networks play a critical role in the internet today -- and how important it is to make sure that the softw...

That old adage about crime never pays could not be more false, at least when it comes to modern-day cybercriminals. For those bad actors using ransomware as their weapon, crime is paying more than ever. A new report by the eSentire security research team found that six ransomware gangs claimed at le...

IT experts at the hacked Colonial Pipeline did a good job in mitigating the May 7 cyberattack and successfully stopped it when discovered by shutting down the network. But the attack was mostly invisible in the weeks-long initial stages, according to a briefing NTT Security executives conducted Tues...

Is Wikipedia a credible source of information?
Loading ... Loading ...