A picture of 2 men running depicting the issue of legacy booking systems disclosing travelers’ private information.

Legacy booking systems disclose travelers’ private information

Travel bookings worldwide are maintained in a handful of systems. The three largest Global Distributed Systems (GDS) Amadeus, Sabre, and Travelport administer more than 90% of flight reservations as well as numerous hotel, car, and other travel bookings. Today’s GDSs…

Read More
A picture of steel chains with one of the chains in red depicting how the blockchain ecosystem has a patch problem.

The blockchain ecosystem has a patch problem

SRLabs research suggests that security vulnerabilities remain unpatched for many Ethereum blockchain participants for extended periods of time, putting the blockchain ecosystem at risk. Crypto currencies provide a popular alternative to centralized payment systems, and promise transactions between mutually anonymous…

Read More
A picture of an exposed private camera showing a man in his room working attached to a blog article about how the cloud exposes private IP cameras.

The Cloud exposes your private IP cameras

In 2016, krebsonsecurity.com was hit by a huge DDoS attack. Shortly thereafter, DNS provider Dyn went down, leaving many web applications unreachable. The Mirai malware drove the attacks by searching for devices with default credentials running telnet services, compromising them…

Read More
A picture of a puzzle in the shape of a brain with the word bias on some of its tiles. this image is attached to a blog article about avoiding status quo bias in cybersecurity. This paper you’ll get an insight into the tendency towards status quo bias, which leads individuals and companies to resist change and stick to familiar ways of doing things.

Avoiding status quo bias in cybersecurity

Summary This paper explores status quo bias, resistance to change, and its impact on cloud adoption and cybersecurity. Discover how concerns over security and control hinder the acceptance of cloud-based solutions and SaaS offerings. Get insights into the benefits, like…

Read More
Automating Vulnerability Management

Vulnerability Management Made Easy

How you can handle 1 million security issues with just 80 actionable workoutsToo many cybersecurity issues generally overwhelm IT staff in remediating the root causes of these flaws. Read in this case study in just 5 minutes how one client…

Read More
A picture of a fingerprint on an optical scanner that depicts banks are known for their strong security efforts and better-than-average protection from hacking

Banking regulation has an effect on Hackability

Banks are known for their strong security efforts and better-than-average protection from hacking. As previously discussed when introducing the Hackability metric, banks rank among the top three industries with the highest level of protection according to the SRLabs Hackability Score.…

Read More