IT Brief India - Technology news for CIOs & IT decision-makers

Security vulnerabilities stories

Story image
Hackuity achieves SOC 2 Type II compliance for data security
5 days ago
#
compliance
#
security vulnerabilities
#
data security
Hackuity, the RBVM company, attains SOC 2 Type II compliance, showcasing strong data security and compliance that uphold rigorous American standards, providing customers with enterprise-grade security assurance.
Story image
Australian & NZ workers fear businesses are ill-equipped for cyber threats
Last week
#
phishing
#
email security
#
casb
Nearly half of Australian and New Zealand workers do not feel ready to combat cyberattack threats, with 43% fearing becoming scam or phishing victims at work, ELMO Software research reveals.
Story image
Absolute Software offers 90-day free support amid Ivanti vulnerabilities
This month
#
cybersecurity
#
security vulnerabilities
#
ivanti
Absolute Software steps up amid Ivanti vulnerabilities, offering 90 days of free product licenses and support to potentially affected organisations for cyber resilience.
Story image
Investment Association alerts UK investors of AI trading risks
This month
#
ai
#
cybersecurity
#
cyber risk
UK's Investment Association cautions investors on relying solely on AI and trading bots for investments, noting the potential financial risks and cybersecurity vulnerabilities.
Story image
UK businesses embrace multi-cloud environments, says OVHcloud report
This month
#
security vulnerabilities
#
cloud adoption
#
agility
Amid growing usage, OVHcloud research reveals 62% of large UK organisations are implementing multi-cloud environments, with 64% predicting an increase over the next two years.
Story image
Sternum & ChargePoint secure Home Flex against IoT vulnerabilities
Last month
#
bi
#
big data
#
cloud services
In a bid to combat IoT vulnerabilities, security firm Sternum collaborates with ChargePoint to enhance the protection of ChargePoint Home Flex, following the uncovering of significant security flaws.
Story image
SecurityBridge rated a top source for SAP vulnerability discoveries
Last month
#
it infrastructure
#
security vulnerabilities
#
sap
SecurityBridge's Research Lab is lauded by SAP's Security Response Team as a leading source for detecting software issues. This recognises a key role in fortifying international SAP security infrastructure.
Story image
Less than 1% vulnerabilities pose highest risk in 2023, finds Qualys
Last month
#
ransomware
#
malware
#
advanced persistent threat protection
Less than 1% of security vulnerabilities created the highest risks to businesses in 2023, with 97 high-risk vulnerabilities exploited undetected, says Qualys Threat Research Unit report.
Story image
Australia's cybersecurity plans overlooked smart home devices, expert warns
Last month
#
edutech
#
power / energy
#
renewable energy
Cybersecurity expert Leon Poggioli believes Australia's proposed cybersecurity law reforms need to pay more heed to smart home devices like solar inverters, crucial for grid stability.
Story image
Report highlights growing cyber vulnerabilities, CISO Darren Humphries comments
Last month
#
security vulnerabilities
#
report
#
qualys
Critical cyber vulnerabilities are soaring, with 74% of firms struggling to swiftly patch holes, warns Darren Humphries, CISO at technology services provider, Acora.
Story image
Semgrep and HackerOne unite to improve code security reviews
Last month
#
advanced persistent threat protection
#
security vulnerabilities
#
context
In response to rising cyber threats, Semgrep and HackerOne's PullRequest aim to streamline early vulnerability detection and testing in software development through a new collaborative initiative.
Story image
Software security strains under supply chain complexity, Slim.AI reveals
Last month
#
ai
#
cybersecurity
#
security vulnerabilities
Over 40% of firms struggle to tackle vulnerabilities in the rising complexity of software supply chains, despite sizeable resource allocation, says Slim.AI's recent Container Report.
Story image
Beware the lasting legacy of the Log4j vulnerability
Mon, 18th Dec 2023
#
cloud services
#
application security
#
open source
Efforts to mitigate the Log4j vulnerability involve updating to patched versions of Log4j, but the process continues to be complex.
Story image
Australian firms boost AI investments for business operations, survey finds
Thu, 14th Dec 2023
#
bi
#
big data
#
cloud services
Australian companies are significantly increasing AI investments to ramp up productivity and outpace competitors, a Dynatrace survey reveals.
Story image
DerScanner introduces Supply Chain Security to protect third-party code elements
Fri, 1st Dec 2023
#
cybersecurity
#
security vulnerabilities
#
cios
DerScanner adds Supply Chain Security feature to verify third-party code, combating rising threats amid increasing open-source software cyberattacks.
Story image
The pressing need for self-healing apps and network resilience
Thu, 30th Nov 2023
#
data protection
#
advanced persistent threat protection
#
compliance
Alarming new data reveals significant vulnerabilities that, if ignored, could lead to catastrophic consequences for enterprises.
Story image
Exclusive: Qualys' risk-based approach to cybersecurity
Mon, 27th Nov 2023
#
cybersecurity
#
security posture
#
qualys
Qualys, a provider of cloud-based security and compliance solutions, has been pivotal in aiding companies through their digital transformation.
Story image
UK employees jeopardise workplace cybersecurity with unauthorised downloads
Thu, 9th Nov 2023
#
compliance
#
cybersecurity
#
risk intelligence & compliance
Two-thirds of UK employees are endangering business cybersecurity by unauthorised app downloads, often unbeknown to IT departments, Armis research reveals.
Story image
Cloud native security threats concern 75% of IT & security leaders
Thu, 9th Nov 2023
#
devops
#
app development
#
apm
New research shows that IT and security leaders believe Kubernetes will play a major role in app development, but are concerned about security.
Story image
GitHub's AI revolution: Transforming code language & developer experience
Thu, 9th Nov 2023
#
siem
#
app development
#
apm
GitHub announces an AI-driven platform that integrates AI into every phase of development, introducing natural language as a universal programming language.
Story image
Updating Apple devices in the era of rapid security responses
Mon, 6th Nov 2023
#
byod
#
apple
#
mobility
Every organisation employing Apple devices must develop and follow a clear strategy to handle Apple’s new RSR approach to OS upgrades.
Story image
In today’s data-driven world, compromising on cybersecurity is not an option
Fri, 3rd Nov 2023
#
martech
#
fintech
#
commerce systems
As the global financial ecosystem expands, it's getting harder for organisations to navigate the maze of cyber risks alone.
Story image
BeyondTrust experts forecast key cybersecurity threats for 2024
Wed, 1st Nov 2023
#
voip
#
contact centre
#
malware
BeyondTrust’s cybersecurity experts predict the main global threats for 2024, including advanced AI threats and a rise in subscription-based model risks.
Story image
Winter Vivern exploits webmail server vulnerability targets European governments
Wed, 1st Nov 2023
#
surveillance
#
cybersecurity
#
cios
Winter Vivern cyber group targets European governments using XSS vulnerability of Roundcube Webmail server, as ESET researchers have discovered.