security - search results
If you're not happy with the results, please do another search
Everyday activities, such as opening an email, clicking on a link in search engine results or just plugging in a printer, can lead to a security incident or data loss.
In total, Microsoft resolved 123 unique vulnerabilities, 18 of which are rated as Critical. Commentary is also provided on Oracle and Adobe updates.
According to recent research, open source vulnerabilities rose by almost 50% in 2019 over the previous year.
Businesses need to overcome some major hurdles before they can securely take advantage of cloud solutions.
Collaboration tools that enable software developers to work at home may also be creating data security vulnerabilities. Balance continuing to innovate with protecting your business.
In the rush to take user-friendly mobile applications to market, many software developers are leaving their customers vulnerable to cyberattacks and data loss.
SD-WANs can help convenience stores tighten cybersecurity while still offering customers the accessibility and innovative shopping experiences they demand.
A cloud native approach changes how software is built, deployed, and run, which changes how systems need to be protected and tested.
Concerns over the COVID-19 pandemic are, understandably, distracting your users. Remind them that hackers, on the other hand, are laser-focused on their objectives.
Your clients are facing multiple hurdles to implementing and managing the solutions they need, creating a viable market for new services and solutions.
Microsoft resolved 99 CVEs in February and issued the first security updates for Edge Chromium browser edition, while Adobe issued multiple updates.
New vulnerabilities put specific devices or systems at risk, US-CERT issues warnings about Dridex malware, and cybercriminals are charged and sentenced.
Development teams are challenged to keep up with flaw remediation, which, if flaws exceed capacity, can result in a growing pool of unresolved issues.
In the near future, developers may see a standards-based, resource-aware API authentication product and mechanisms to secure localStorage.
BYOD and 5G security concerns increase while no-code platforms enable teams to automate routine tasks.