#enterprise-security

[ follow ]
#risk-management
fromInfoQ
1 week ago

Docker Introduces Hardened Images to Strengthen Container Security

Docker's Hardened Images, which are security-hardened container images, aim to simplify the secure deployment of containers and protect against software supply chain threats.
DevOps
fromComputerWeekly.com
2 weeks ago

The Security Interviews: David Faugno, 1Password | Computer Weekly

"The world was fundamentally changing. The way people worked and the tools that businesses had provided to their employees needed to adapt and transform alongside the expectations of a more digitally connected workforce."
Information security
#cybersecurity
Information security
fromSecuritymagazine
1 month ago

Nearly 50% of mobile devices run outdated operating systems

Outdated mobile OSes present a significant vulnerability, exploiting nearly 50% of devices.
Mobile phishing threats are increasing, with 'mishing' and 'smishing' as key concerns.
Information security
fromIT Pro
3 weeks ago

The days of bringing your own device to work could be coming to an end

Many enterprises consider banning personal devices at work due to security risks posed by unauthorized tech.
Privacy professionals
fromArs Technica
1 month ago

Google: Governments are using zero-day hacks more than ever

Government-sponsored hacking is increasingly targeting enterprise technologies with the highest share of zero-day vulnerabilities in 2024.
Commercial surveillance vendors are implicated in government hacking activities.
Information security
fromComputerworld
3 weeks ago

Meta wins $168M judgment against spyware seller NSO Group

State-sponsored and commercial surveillance tools pose significant threats to organizations.
Zero-click vulnerabilities can bypass traditional security measures, necessitating new security frameworks.
Information security
fromDatabreaches
1 month ago

CISA warns of increased breach risks following Oracle Cloud leak

CISA warns of increased breach risks due to Oracle Cloud servers compromise, emphasizing the threat to enterprise networks and credential security.
Privacy professionals
fromInfoQ
1 month ago

Cloudflare Security Week 2025: From Quantum Cryptography to AI Labyrinth

Cloudflare enhances security services and launches AI-centric tools to combat evolving threats, particularly quantum risks during Security Week 2025.
Information security
fromSecuritymagazine
1 month ago

Nearly 50% of mobile devices run outdated operating systems

Outdated mobile OSes present a significant vulnerability, exploiting nearly 50% of devices.
Mobile phishing threats are increasing, with 'mishing' and 'smishing' as key concerns.
Information security
fromIT Pro
3 weeks ago

The days of bringing your own device to work could be coming to an end

Many enterprises consider banning personal devices at work due to security risks posed by unauthorized tech.
Privacy professionals
fromArs Technica
1 month ago

Google: Governments are using zero-day hacks more than ever

Government-sponsored hacking is increasingly targeting enterprise technologies with the highest share of zero-day vulnerabilities in 2024.
Commercial surveillance vendors are implicated in government hacking activities.
Information security
fromComputerworld
3 weeks ago

Meta wins $168M judgment against spyware seller NSO Group

State-sponsored and commercial surveillance tools pose significant threats to organizations.
Zero-click vulnerabilities can bypass traditional security measures, necessitating new security frameworks.
Information security
fromDatabreaches
1 month ago

CISA warns of increased breach risks following Oracle Cloud leak

CISA warns of increased breach risks due to Oracle Cloud servers compromise, emphasizing the threat to enterprise networks and credential security.
Privacy professionals
fromInfoQ
1 month ago

Cloudflare Security Week 2025: From Quantum Cryptography to AI Labyrinth

Cloudflare enhances security services and launches AI-centric tools to combat evolving threats, particularly quantum risks during Security Week 2025.
#cybersecurity-risks
Privacy professionals
fromThe Hacker News
1 month ago

AI Adoption in the Enterprise: Breaking Through the Security and Compliance Gridlock

AI adoption in enterprises is hindered by security, legal, and compliance challenges, delaying innovation.
Compliance concerns are the primary obstacle for organizations looking to implement AI.
#cyber-threats
Privacy professionals
fromZDNET
2 months ago

Navigating AI-powered cyber threats in 2025: 4 expert security tips for businesses

Cybercriminals leverage AI to enhance the precision and effectiveness of cyberattacks, making security strategies more critical than ever.
Privacy professionals
fromZDNET
2 months ago

Navigating AI-powered cyber threats in 2025: 4 expert security tips for businesses

Cybercriminals leverage AI to enhance the precision and effectiveness of cyberattacks, making security strategies more critical than ever.
[ Load more ]