#enterprise-security

[ follow ]
#cybersecurity
Tech industry
fromZDNET
9 months ago

What caused the great CrowdStrike-Windows meltdown of 2024? History repeating

A faulty update from CrowdStrike caused chaos, affecting millions of Windows devices and major industries globally.
Information security
fromSecuritymagazine
2 days ago

Nearly 50% of mobile devices run outdated operating systems

Outdated mobile OSes present a significant vulnerability, exploiting nearly 50% of devices.
Mobile phishing threats are increasing, with 'mishing' and 'smishing' as key concerns.
Privacy professionals
fromArs Technica
1 day ago

Google: Governments are using zero-day hacks more than ever

Government-sponsored hacking is increasingly targeting enterprise technologies with the highest share of zero-day vulnerabilities in 2024.
Commercial surveillance vendors are implicated in government hacking activities.
Tech industry
fromZDNET
9 months ago

What caused the great CrowdStrike-Windows meltdown of 2024? History repeating

A faulty update from CrowdStrike caused chaos, affecting millions of Windows devices and major industries globally.
Information security
fromSecuritymagazine
2 days ago

Nearly 50% of mobile devices run outdated operating systems

Outdated mobile OSes present a significant vulnerability, exploiting nearly 50% of devices.
Mobile phishing threats are increasing, with 'mishing' and 'smishing' as key concerns.
Privacy professionals
fromArs Technica
1 day ago

Google: Governments are using zero-day hacks more than ever

Government-sponsored hacking is increasingly targeting enterprise technologies with the highest share of zero-day vulnerabilities in 2024.
Commercial surveillance vendors are implicated in government hacking activities.
more#cybersecurity
#cybersecurity-risks
fromTechRepublic
1 week ago
Artificial intelligence

Network Security at the Edge for AI-ready Enterprise

Organizations rapidly adopting generative AI face significant cybersecurity challenges, with less than 50% prepared to manage risks.
fromSecuritymagazine
1 month ago
Information security

Rooted mobile devices are 250 times more vulnerable

Rooted and jailbroken devices pose significant security risks to users and enterprises, with a high likelihood of malware targeting.
more#cybersecurity-risks
Privacy professionals
fromThe Hacker News
3 weeks ago

AI Adoption in the Enterprise: Breaking Through the Security and Compliance Gridlock

AI adoption in enterprises is hindered by security, legal, and compliance challenges, delaying innovation.
Compliance concerns are the primary obstacle for organizations looking to implement AI.
#cyber-threats
fromZDNET
1 month ago
Privacy professionals

Navigating AI-powered cyber threats in 2025: 4 expert security tips for businesses

Cybercriminals leverage AI to enhance the precision and effectiveness of cyberattacks, making security strategies more critical than ever.
fromThe Hacker News
5 months ago
Privacy professionals

Enterprise Identity Threat Report 2024: Unveiling Hidden Threats to Corporate Identities

Corporate identity is the new perimeter for data security, but many enterprises overlook how identities are managed across platforms, increasing vulnerability.
Privacy professionals
fromZDNET
1 month ago

Navigating AI-powered cyber threats in 2025: 4 expert security tips for businesses

Cybercriminals leverage AI to enhance the precision and effectiveness of cyberattacks, making security strategies more critical than ever.
fromThe Hacker News
5 months ago
Privacy professionals

Enterprise Identity Threat Report 2024: Unveiling Hidden Threats to Corporate Identities

Corporate identity is the new perimeter for data security, but many enterprises overlook how identities are managed across platforms, increasing vulnerability.
more#cyber-threats
fromComputerWeekly.com
5 months ago
Information security

IAM: Enterprises face a long, hard road to improve | Computer Weekly

Effective identity and access management (IAM) is crucial for balancing security and ease of use in enterprises.
#user-experience
fromComputerworld
6 months ago
Information security

How IT admins should think about a more open Apple

Customization in browsers offers benefits but poses risks, particularly in enterprise settings.
Admins need proactive strategies to manage potential vulnerabilities and compatibility issues.
fromAzure DevOps Blog
6 months ago
DevOps

Using Entra profile information in Azure DevOps - Azure DevOps Blog

Entra profile integration in Azure DevOps enhances accuracy, security, and compliance for Enterprise customers.
fromForbes
5 months ago
Information security

The Evolving Role Of Password Management In Modern Security

Password managers are essential tools for enhancing enterprise security while accommodating flexible work environments.
fromComputerworld
6 months ago
Information security

How IT admins should think about a more open Apple

Customization in browsers offers benefits but poses risks, particularly in enterprise settings.
Admins need proactive strategies to manage potential vulnerabilities and compatibility issues.
fromAzure DevOps Blog
6 months ago
DevOps

Using Entra profile information in Azure DevOps - Azure DevOps Blog

Entra profile integration in Azure DevOps enhances accuracy, security, and compliance for Enterprise customers.
fromForbes
5 months ago
Information security

The Evolving Role Of Password Management In Modern Security

Password managers are essential tools for enhancing enterprise security while accommodating flexible work environments.
more#user-experience
fromThe Hacker News
6 months ago
Information security

A Comprehensive Guide to Finding Service Accounts in Active Directory

Service accounts are critical yet pose security risks if unmonitored.
Information security
fromSecuritymagazine
6 months ago

The deepfake dilemma: The importance of deepfake awareness training

Deepfakes represent a serious and emerging threat to enterprise security, necessitating awareness training to mitigate risks. Their realistic nature can easily mislead individuals.
#generative-ai
fromITPro
8 months ago
Artificial intelligence

Workers are using generative AI tools on the sly, and it needs to stop

UK workers are voluntarily paying for generative AI tools, indicating a need for organizations to develop their own solutions to keep up.
fromITPro
11 months ago
Artificial intelligence

WithSecure's generative AI focus could be the key to cracking its mid-market push

WithSecure is striving to find its niche in the enterprise security space by expanding its cloud security platform and leveraging generative AI technology.
fromITPro
8 months ago
Artificial intelligence

Workers are using generative AI tools on the sly, and it needs to stop

UK workers are voluntarily paying for generative AI tools, indicating a need for organizations to develop their own solutions to keep up.
fromITPro
11 months ago
Artificial intelligence

WithSecure's generative AI focus could be the key to cracking its mid-market push

WithSecure is striving to find its niche in the enterprise security space by expanding its cloud security platform and leveraging generative AI technology.
more#generative-ai
fromSimplilearn.com
4 years ago
Data science

Data Architect: Roles, Skills, and How to Become One in 2024

Businesses actively analyze data for better decisions; spending on data to rise.
Data architecture crucial for organizing data for efficient utilization and security in enterprises.
#cloud-security
fromDevOps.com
10 months ago
Information security

Aqua Security - DevOps.com

Aqua Security offers a Cloud Native Application Protection Platform (CNAPP) for end-to-end security in cloud-native environments.
fromDevOps.com
10 months ago
Information security

Aqua Security - DevOps.com

Aqua Security offers a Cloud Native Application Protection Platform (CNAPP) for end-to-end security in cloud-native environments.
more#cloud-security
[ Load more ]