A company's response to a breach is more important than almost anything else. But what constitutes a "good" response following a security incident? (Part 2 of a series.)
Read moreA company's response to a breach is more important than almost anything else. But what constitutes a "good" response following a security incident? (Part 2 of a series.)
Read moreAndroid May 2022 updates are out - with some critical fixes in some critical places. Learn more...
Read moreCompanies see AI-powered cybersecurity tools and systems as the future, but at present nearly 90% of them say they face significant hurdles in making use of them.
Read moreWhat Stars Wars Teaches Us About Threats
May 4 2022The venerable film franchise shows us how to take threats in STRIDE.
Read moreAutoRABIT Secures $26M in Series B Investment from Full In Partners to Expand DevSecOps Platform
May 4 2022AutoRABIT intends to direct the funding toward growth initiatives and product development.
Read moreAlso adds support for Google Cloud Platform (GCP) and Microsoft Azure, and PCI compliance coverage.
Read moreSix boxes of paper documents were removed from the facility without authorization in early March.
Read moreNew Sophisticated Malware
May 4 2022Mandiant is reporting on a new botnet.
The group, which security firm Mandiant is calling UNC3524, has spent the past 18 months burrowing into victims’ networks with unusual stealth....
Read more
The security research partnership will focus on developing new techniques and releasing them as open source.
Read more
Recent Comments