Accenture appoints Jack Azagury as Group Chief Executive – Strategy & Consulting

Accenture has appointed Jack Azagury as group chief executive – Strategy & Consulting, effective now. Azagury will lead the $15 billion Strategy & Consulting service, which includes Accenture’s industry,... Read more »

Microsoft Office apps are vulnerable to IDN homograph attacks

Microsoft Office apps – including Outlook and Teams – are vulnerable to homograph attacks based on internationalized domain names (IDNs). In practice, this means that users hovering above a... Read more »

Concentric’s AI technologies simplify and automate data security

Visit Concentric AI at RSA Conference 2022 – Early Stage Expo in the South Hall on the second level, booth 18. You’ll be able to see their product in... Read more »

CIOs and network engineers rank cybersecurity among the biggest risks

Network engineers and CIOs agree that cybersecurity issues represent the biggest risk for organizations that fail to put networks at the heart of digital transformation plans. According to a... Read more »

How to support women in cybersecurity

Cybersecurity is required to be a dynamic industry because cybercriminals don’t take days off. Cybersecurity professionals must be innovative, creative, and attentive to keep gaining the upper hand on... Read more »

A closer look at the 2022 Microsoft Vulnerabilities Report

BeyondTrust’s recent 2022 Microsoft Vulnerabilities Report includes the latest annual breakdown of Microsoft vulnerabilities by category and product, as well as a six-year trend analysis, providing a holistic understanding... Read more »

The cyber posture of the U.S. Federal Government

Government agencies are prime targets for attack due to the sheer amount of sensitive information they possess. As today’s geopolitical landscape continues to become more dangerous, insight into where... Read more »

Massive shadow code risk for world’s largest businesses

Source Defense announced the results of a study that for the first time sizes the security, privacy, and compliance risks that are literally designed into the digital supply chains... Read more »

Language-based BEC attacks rising

Armorblox released a report which highlights the use of language-based attacks that bypass existing email security controls. The report uncovers how the continued increase in remote work has made... Read more »

Autonomous vehicles can be tricked into erratic driving behavior

When a driverless car is in motion, one faulty decision by its collision-avoidance system can lead to disaster, but researchers at the University of California, Irvine have identified another... Read more »
Subscribe to our Newsletter