What you need to know about prototype pollution and how it affects JavaScript

No, this is not about solid waste generated with the production of prototypes or models for different products. Prototype pollution here refers to a critical cyber threat rated 10/10 on the CVSS scale of severity. In a paper published in…

Continue Reading What you need to know about prototype pollution and how it affects JavaScript

Attacks on healthcare organizations increase 90 percent

There has been a 90 percent increase in the number of healthcare organizations targeted by cyber-attacks, in comparison with the first quarter of 2022. The latest cyber threat Landscape report from Kroll finds that while phishing continues to be the…

Continue Reading Attacks on healthcare organizations increase 90 percent

Why run your database in Kubernetes? [Q&A]

Kubernetes is one of the most widely used platforms for running containerized applications. Many businesses though still run their databases in a more traditional environment. Of course there’s no reason why you can’t run a database in Kubernetes and there…

Continue Reading Why run your database in Kubernetes? [Q&A]

Following bug-related delay, Ubuntu Linux 22.04.1 LTS (Jammy Jellyfish) is finally here

Earlier this month, we shared the news that Ubuntu 22.04.1 LTS (code-named “Jammy Jellyfish”) was being delayed. Sadly, the first point release of the wildly popular operating system was being pushed back an entire week — an absolute eternity in…

Continue Reading Following bug-related delay, Ubuntu Linux 22.04.1 LTS (Jammy Jellyfish) is finally here

Digital transformation with four underutilized cloud-based capabilities

Making the most productive use of an organization’s digital resources is a vital ingredient for success in today’s ultra-competitive business landscape. Companies are challenged to extract the maximum value from their data assets when using exclusively in-house computing solutions. This…

Continue Reading Digital transformation with four underutilized cloud-based capabilities

Get ‘Diversity Intelligence’ ($15 value) FREE for a limited time

In Diversity Intelligence: How to Create a Culture of Inclusion for your Business, keynote speaker and diversity and inclusion expert Heidi R. Andersen delivers a step-by-step walkthrough of how to create an inclusive culture,  and break down the barriers to achieving diversity.  You’ll find practical advice for creating the…

Continue Reading Get ‘Diversity Intelligence’ ($15 value) FREE for a limited time

Twice as nice? Who needs a digital twin?

The internet is always abuzz with new technology trends, and anyone who follows them will be familiar with the terms “digital twin” or “digital twin of an organization”. Although digital twins have been around for several decades, the rapid rise…

Continue Reading Twice as nice? Who needs a digital twin?

New cloud-based platform helps protect operational security

As more and more devices that we might not conventionally think of as ‘IT’ become connected, the risks to enterprises increase. To address this concern Claroty is launching xDome, a new cloud-based industrial cybersecurity platform that drives cyber and operational…

Continue Reading New cloud-based platform helps protect operational security

What is the future of cryptocurrency regulation?

The cryptocurrency industry rose to prominence in the United States in 2014. Since then, people have debated whether the U.S. government should get involved in regulating the new form of commerce and to what extent. On one hand, Congress doesn’t…

Continue Reading What is the future of cryptocurrency regulation?

Stolen data used to launch more effective BEC attacks

New research from Accenture shows that data stolen in ransomware and other cyberattacks is being weaponized in order to carry out business email compromise (BEC) attacks. Underground forums have sets of credentials for sale for as little as $10 that…

Continue Reading Stolen data used to launch more effective BEC attacks