Be aware before you share! That's a good rule for developers and techies, just as much as it is for social media addicts.
Read moreNorth Korean Hacking Group Targets Diplomats, Forgoes Malware
November 18 2021The TA406 group uses credential harvesting to target diplomats and policy experts in the United States, Russia, China, and South Korea, rarely resorting to malware.
Read moreNorth Korean Hacking Group Targets Diplomats, Forgoes Malware
November 18 2021The TA406 group uses credential harvesting to target diplomats and policy experts in the United States, Russia, China, and South Korea, rarely resorting to malware.
Read moreCalifornia Pizza Kitchen Suffers Data Breach
November 18 2021Personal data, including Social Security numbers, of more than 100K employees exposed.
Read moreAddressing the Low-Code Security Elephant in the Room
November 18 2021The danger of anyone being able to spin up new applications is that few are thinking about security. Here's why everyone is responsible for the security of low-code/no-code applications.
Read moreLatest episode - listen now!
Read moreBased on the reaction of a single insect in a swarm, messages are passed along peer to peer, and an entire environment can respond without a central leader processing...
Read moreResearch shows that multiple attack groups have been using the Microsoft file-sharing service - leveraging phishing kit for much longer than previously thought.
Read moreArtificial Intelligence and Machine Learning, Cloud Computing, and 5G Will Be the Most Important Technologies in 2022, Says New IEEE Study
November 18 2021Chief information officers, chief technology officers, and technology leaders globally surveyed on key technology trends, priorities, and predictions for 2022 and beyond.
Read moreGBG Announces It Has Agreed to Acquire Acuant
November 18 2021GBG announces it has agreed to acquire Acuant, bringing together two leaders in the global digital identity market with combined revenue of c.£265 million.
Read more
Recent Comments