Recent Security News

  • Data Security and Collaboration in the Modern Enterprise

    October 18, 2023 at 08:55AM Modern enterprises face the challenge of balancing the need for data collaboration and expanded access with the increased risk of cybersecurity threats. Traditional data security measures are insufficient for the data needs of modern enterprises. The CISO Survival Guide emphasizes the importance of data access control and the intersection of…

    Read More

  • Fraud Prevention Firm Fingerprint Raises $33 Million

    October 18, 2023 at 08:48AM Fraud prevention provider Fingerprint has raised $33 million in a Series C funding round, bringing its total funding to $77 million. The Chicago-based company offers a device identification platform-as-a-service that helps organizations identify fraudsters while providing a seamless experience for legitimate users. Their device fingerprinting technology and flexible APIs enable…

    Read More

  • Lost and Stolen Devices: A Gateway to Data Breaches and Leaks

    October 18, 2023 at 08:48AM Lost and stolen computers pose a significant risk to data security, accounting for 17% of breaches. The threats include unauthorized access, lack of encryption, and physical access to corporate networks. To mitigate this risk, organizations should train employees, implement geolocation and geofencing, conduct endpoint data discovery, apply endpoint data encryption,…

    Read More

  • Oracle Patches 185 Vulnerabilities With October 2023 CPU

    October 18, 2023 at 08:48AM Oracle has released 387 new security patches as part of the October 2023 CPU. Over 40 patches address critical-severity flaws and more than 200 resolve bugs that can be remotely exploited. The patches cover various Oracle products, with Financial Services Applications receiving the most fixes. Oracle advises customers to apply…

    Read More

  • Unraveling Real-Life Attack Paths – Key Lessons Learned

    October 18, 2023 at 08:15AM Attackers in the cybersecurity landscape are constantly searching for vulnerabilities and exploit combinations within organizational environments. Security tools often fail to prioritize threats effectively and provide context on how issues can be leveraged by attackers. Real-life attack path scenarios reveal that 75% of critical assets can be compromised in their…

    Read More