While it may be obvious that addressing vulnerabilities eats up the most time for IT security pros, what may surprise you is the source of those vulnerabilities.
- Microsoft closes security ‘loophole’ in AzureAD 2FA registration process
- Ease-of-use makes Deakin University’s ‘smarter SIEM’ as valuable for cybersecurity students as for SOC staff
- At least 10m records compromised in single Australian data breach despite drop in NDB reports
- iOS 12.3 kills support for Google’s Bluetooth Titan security key over hijacking flaw
- Extreme Networks grows networked IoT security protection