The Ponemon Institute surveyed nearly 1,400 IT and IT security practitioners in the United States, European Union and Asia-Pacific to understand the risk unprotected applications pose to businesses wh
Resources
The world of cloud changes quickly.
Stay up-to-date with the latest trends & innovation, all explored in our resource library.
-
First-Ever Ransomware Found Using Using ‘Process Doppelgänging’ Attack to Evade Detection Security researchers have spotted the first-ever ransomware exploiting Process Doppelgänging, a new fileless code injection technique that could help malware evade detection.
11th May, 2018 -
GDPR Requirements Prompt New Approach to Protecting Data in Motion GDPR will take effect on May 25, a response to data breaches and demands for greater oversight relating to security of personal identifiable information (PII).
7th May, 2018 -
Google Announces the Open-Source Asylo Framework for Confidential Computing Google announced the release of an open-source framework and an SDK dubbed ‘Asylo’ that allows developers to build applications targeting trusted execution environments.
7th May, 2018 -
Crypto Flaw in Oracle Acess Manager Allows Attackers to Pass Through A padding oracle vulnerability in Oracle Access Manager (CVE-2018-2879) can be exploited by attackers to bypass authentication and impersonate any user account.
7th May, 2018 -
8 New Spectre-Class Vulnerabilities Found in Intel CPUs A team of security researchers has reportedly discovered a total of eight new "Spectre-class" vulnerabilities in Intel CPUs, which also affect at least a small number of ARM processors and may impact
7th May, 2018 -
Less Than 10% of Organizations Are Ready for Multi-Cloud IDC has revealed that only 10% of European businesses are ready to implement multi-cloud infrastructure, with the majority of businesses sticking to one cloud vendor.
4th May, 2018 -
A New Cryptocurrency Mining Virus is Spreading Through Facebook Cybersecurity researchers from Trend Micro are warning users of a malicious Chrome extension which is spreading through Facebook Messenger and targeting users of cryptocurrency trading platforms to st
4th May, 2018 -
New Rowhammer Attack Can be Used to Hack Android Devices Remotely Researchers have demonstrated that it is possible to use a Rowhammer attack to remotely hack Android phones.Vulnerable smartphones can be targeted by tricking users into visiting a website hosting a m
4th May, 2018 -
New Phishing Attack Targets 550 Million Email Users Worldwide A new phishing campaign was discovered sending more than 550 million emails within the first quarter of 2018, according to data from Vade Secure. The threat was discovered in early January and has pri
30th April, 2018 -
Azure Container Instances Now Generally Available Microsoft announced the general availability of Azure Container Instances (ACI) – a serverless way to run both Linux and Windows containers. ACI offers an on-demand compute service delivering rapid de
30th April, 2018 -
Most Companies Not Ready for GDPR, Survey Reveals With less than a month until the GDPR comes into force, many companies will not be ready when it takes effect on May 25th, 2018. 62% of IT Decision Makers (ITDMs) surveyed describe themselves as ‘conf
30th April, 2018 -
Release of PoC Exploit for New Drupal Flaw Once Again Puts Sites Under Attack Only a few hours after the Drupal team releases latest updates to fix a new remote code execution flaw in its content management system software, hackers have already started exploiting the vulnerabil
27th April, 2018