While we can blame the cloud for shadow IT 2.0, SaaS isn’t the culprit this time. New competitive disruptors to our businesses are armed with digital services, making digitalization a mandate for business survival. Digitalization, though, requires agility. Source: Three Ways to Combat Shadow IT 2.0
Read More‘Collision’ attack by researchers at CWI Institute and Google underscores need to retire SHA-1. Source: Google Researchers ‘Shatter’ SHA-1 Hash
Read MoreLast week, we reported about a critical zero-day flaw in WordPress that was silently patched by the company before hackers have had their hands on the nasty bug to exploit millions of WordPress websites. To ensure the security of millions of websites and its users, WordPress delayed the vulnerability disclosure for over a week and…
Read MoreIf it isn’t secure, it shouldn’t be allowed on the Internet. There, I said it. The litany of increasingly menacing cyber hacks, breaches and blockages of 2016 casts a dark shadow on our collective rush to innovate. While not responsible for every new attack, the rise of the IoT has demonstrably fueled a heightened level…
Read More
Recent Comments