IT/OT Convergence Is More Than a Catchy Phrase
January 7 2022The most successful strategies for protecting IT and OT from growing threats will include use of both the ISO 27000 series and ISA/IEC 62443 family of standards.
Read moreThe most successful strategies for protecting IT and OT from growing threats will include use of both the ISO 27000 series and ISA/IEC 62443 family of standards.
Read moreLogic flaw exists in malware that can be used to prevent it from encrypting remote shares, security vendor says.
Read more"It's Log4Shell, Jim, but not as we know it." How to find and fix a JNDI-based vuln in the H2 Database Engine.
Read moreIncreased digitization makes strong cybersecurity more important than ever.
Read moreNorton 360 can now mine Ethereum. It’s opt-in, and the company keeps 15%. It’s hard to uninstall this option.
Read moreThe 2021 Strategic Security Survey highlights concerns related to the cloud environment, such as the ability to detect breaches and the increasing number of attacks against cloud systems.
Read moreAttackers use the comment feature in Google Docs to email victims and lure them into clicking malicious links.
Read moreA suspected ransomware attack has led Bernalillo County officials to take systems offline and sever network connections.
Read moreCloud Native Application Protection Platforms (CNAPP) allow organizations to secure cloud-native applications across the full application life cycle.
Read moreA Romanian researcher discovers more than 70 vulnerabilities in how applications and their content delivery networks handle cache misses that open the doors to denial-of-service attacks.
Read more
Recent Comments