Skip to content
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • LABS
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap
GeekWire
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • LABS
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap

Digital Transformation

How to add security to digital transformation processes

20 June 2019

Marco Rottigni, Chief Technical Security Officer for Qualys across EMEA, talks about adding security to digital transformation processes. …

Tags CISO, Digital Transformation, Editor'S Choice, How, Qualys

How to add security to digital transformation processes

20 June 2019

Marco Rottigni, Chief Technical Security Officer for Qualys across EMEA, talks about adding security to digital transformation processes. …

Tags CISO, Digital Transformation, Editor'S Choice, How, Qualys, Strategy

Executives now recognize cybersecurity as a key business driver

19 June 2019

The predominance of cybersecurity as a business issue extends to the board, with a majority (72%) of executives reporting information …

Tags Ceo, CISO, Digital Transformation, Executives, Radware, Strategy

Cybersecurity Falls Short in Organizations Undergoing Digital Transformation

18 June 2019

While C-level executives understand the need for cybersecurity as their organizations undergo digital transformation, they aren’t …

Tags Cloud Computing, Digital Transformation, Education, Organizations

Fusing Security with Digital Transformation for SMBs

14 June 2019

Digital transformation impacts the way that organizations deal with cybersecurity risk, says Tim Wilkinson of Avast Business, who provides …

Tags Digital Transformation

Poor data management can cost organizations $20 million each year

7 June 2019

Over the past decade, the amount of data generated has exploded; data growth and sprawl is so rampant that by 2025 we will generate more …

Tags Cio, Cloud Computing, Digital Transformation, Strategy, Tips

#Infosec19: Security Must Support Digital Transformation & Enable the Business

5 June 2019

At Infosecurity Europe 2019 Ewa Pilat, global CISO at Jaguar Land Rover, explored how the security function can and must support and enable …

Tags Business, Digital Transformation, Support

Getting ready for digital transformation: The biggest cybersecurity challenges

22 May 2019

Tackling cyber risk that comes with digital transformation is a must. “One major challenge has to do with data management and …

Tags Cio, Digital Transformation, Editor'S Choice, Features, Strategy, Tips

Organizations face operational deficiencies as they deal with hybrid IT complexities

22 May 2019

While enterprises are taking advantage of cloud computing, all enterprises have on-going data center dependencies, a Pulse Secure report …

Tags Cloud, Cloud Adoption, Data Security, Digital Transformation, hybrid IT, Organizations, Surveys

The 3 keys to tackling data management complexity: performance, scalability and reliability

21 May 2019

As everyone attempts to become a digital business, data becomes more crucial in driving business value. But protecting that data has become …

Tags Bid Data, Big Data, Cloud Computing, Data Management, Data Protection, Data Recovery, Digital Transformation

A traditional approach to security harms digital transformation efforts

21 May 2019

Half of security professionals who adopt a more traditional or reactive approach to their data protection and security don’t believe they …

Tags Articles, Digital Transformation

Traditional approach to data security hindering digital transformation initiatives

21 May 2019

Security professionals who adopted a more traditional or reactive approach to their data protection and security program did not believe …

Tags Cio, CISO, Data Protection, Digital Transformation, Strategy, Surveys

The six biggest cybersecurity risks facing the utilities industry

16 May 2019

The utilities industry is rapidly modernizing its infrastructure, adding more digitized equipment and connectivity across devices, plants, …

Tags ABI Research, Digital Transformation

Introducing the Digital Transformation Architect

15 May 2019

For companies today, digital transformation poses a “do-or-die” proposition — in many cases, …

Tags Architects, Digital Transformation
Older posts
Page1 Page2 … Page20 Next →
Cookie-Free

NVD

  • CVE-2023-1753 – Weak Password Requirements in GitHub repository thorsten/phpmyfaq prior to 3.1.12. …31 March 2023
  • CVE-2023-1747 – A vulnerability has been found in IBOS up to 4.5.4 and classified as critical. Affected by …31 March 2023
  • CVE-2023-1754 – Improper Input Validation in GitHub repository thorsten/phpmyfaq prior to 3.1.12. …31 March 2023
  • CVE-2023-1769 – A vulnerability, which was classified as problematic, was found in SourceCodester Grade Po …31 March 2023
  • CVE-2023-1759 – Cross-site Scripting (XSS) – Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.12 …31 March 2023
  • CVE-2023-1760 – Cross-site Scripting (XSS) – Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.12 …31 March 2023

EXPLOITS

  • SOUND4 IMPACT/FIRST/PULSE/Eco v2.x – Unauthenticated Factory Reset31 March 2023
  • Judging Management System v1.0 – Authentication Bypass31 March 2023
  • SOUND4 IMPACT/FIRST/PULSE/Eco v2.x – Remote Command Execution (RCE)31 March 2023
  • Bangresto 1.0 – SQL Injection31 March 2023
  • SOUND4 IMPACT/FIRST/PULSE/Eco v2.x – Authentication Bypass31 March 2023
  • Textpattern 4.8.8 – Remote Code Execution (RCE) (Authenticated)31 March 2023

SECURELIST

  • Selecting the right MSSP: Guidelines for making an objective decision30 March 2023
  • Financial cyberthreats in 202229 March 2023
  • Copy-paste heist or clipboard-injector attacks on cryptousers28 March 2023
  • How scammers employ IPFS for email phishing27 March 2023
  • Understanding metrics to measure SOC effectiveness24 March 2023
  • Developing an incident response playbook23 March 2023
Copyright © 2023 GeekWire | Cookie-Free | Privacy Policy | We are not responsible for the content of external sites.
Next Page »