Narrow the Scope of Compliance
April 26 2020Many organizations are doing more than they need regarding compliance. Compliance budgets are high on the agenda of every CISO and CIO. New regulations to comply with, new environments...
Read moreMany organizations are doing more than they need regarding compliance. Compliance budgets are high on the agenda of every CISO and CIO. New regulations to comply with, new environments...
Read moreTracking the cryptocurrency paid by victims finds that, even with a low rate of payout, the scheme netted a cool half million for the various groups involved. A simple...
Read moreTracking the cryptocurrency paid by victims finds that, even with a low rate of payout, the scheme netted a cool half million for the various groups involved. A simple...
Read moreA look at how the so-called Florentine Banker Group lurked for two months in a sophisticated business email compromise attack on Israeli and UK financial companies. A cybercriminal group...
Read moreA look at how the so-called Florentine Banker Group lurked for two months in a sophisticated business email compromise attack on Israeli and UK financial companies. A cybercriminal group...
Read moreAs more so-called Internet of Medical Things devices go online, hospitals and medical facilities face significant challenges in securing them from attacks that could endanger patients’ lives. As COVID-19...
Read moreAs more so-called Internet of Medical Things devices go online, hospitals and medical facilities face significant challenges in securing them from attacks that could endanger patients’ lives. As COVID-19...
Read moreBugs don’t pose an immediate threat, and there is no evidence they were exploited, as ZecOps claimed earlier this week, Apple says. Apple is challenging the reported severity of...
Read moreBugs don’t pose an immediate threat, and there is no evidence they were exploited, as ZecOps claimed earlier this week, Apple says. Apple is challenging the reported severity of...
Read moreThe lack of quotation marks in the way a service called an application left MSI computers open to persistent privilege escalation attacks. Micro-Star International (MSI), a computer manufacturer that...
Read more
Recent Comments