Brute-Force Attacks, Vulnerability Exploits Top Initial Attack Vectors
September 13 2021A new analysis emphasizes how most security incidents can be avoided with strong patch management and password management policies.
Read moreA new analysis emphasizes how most security incidents can be avoided with strong patch management and password management policies.
Read moreCCSP certification validates comprehensive vendor-neutral cloud security expertise, as demand for proven talent for protecting data and cloud infrastructure intensifies.
Read moreThe vast majority (86.7%) of C-suite and other executives say they expect the number of cyberattacks targeting their organizations to increase over the next 12 months, according to a...
Read moreAn important security update addresses vulnerabilities in CoreGraphics and WebKit that may have been actively exploited.
Read moreWorking in infosec has its challenges, and it's easy enough to complain about them. But that won't solve anything.
Read moreHey, let's create a text file that lists our security contacts! We'll call it... security DOT txt.
Read moreThe company's technology will integrate with Booz Allen's commercial cyber business.
Read moreOver the past four years, Todt has led CRI from conception to one of the leading global cybersecurity resources available to small and medium-sized enterprises (SMEs).
Read moreSuccessful collaboration requires a four-pronged approach that considers operations and infrastructure, leverages shared data, supports new workflows, and is formalized with documentation.
Read moreSusan Landau wrote an essay on the privacy, efficacy, and equity of contract-tracing smartphone apps. Also see her excellent book on the topic.
Read more
Recent Comments