M&A activity in the identity and access management (IAM) space has continued at a steady clip so far this year.
Read moreMudge Blows Whistle on Alleged Twitter Security Nightmare
August 23 2022Lawmakers and cybersecurity insiders are reacting to a bombshell report from former Twitter security head Mudge Zatko, alleging reckless security lapses that could be exploited by foreign adversaries.
Read moreProofpoint Introduces a Smarter Way to Stay Compliant with New Intelligent Compliance Platform
August 23 2022Integrated solution offers enterprises modern regulatory compliance safeguards while simplifying corporate legal protection practices.
Read moreProofpoint Introduces a Smarter Way to Stay Compliant with New Intelligent Compliance Platform
August 23 2022Integrated solution offers enterprises modern regulatory compliance safeguards while simplifying corporate legal protection practices.
Read moreSecure Code Warrior Spotlights the Importance of Developer Security Skills with 2nd Annual Devlympics Competition
August 23 2022The global secure coding competition will be held In October, during Cybersecurity Awareness Month.
Read moreThe scans used by the Python Package Index (PyPI) to find malware fail to catch 41% of bad packages, while creating plentiful false positives.
Read moreThe criminals didn't implant any malware. The attack was orchestrated via malevolent configuration changes.
Read moreCompany fortifies its ability to help organizations prepare and obtain CMMC certification.
Read moreApathy is Your Company’s Biggest Cybersecurity Vulnerability — Here’s How to Combat It
August 23 2022Make security training more engaging to build a strong cybersecurity culture. Here are four steps security and IT leaders can take to avoid the security disconnect.
Read moreMeta Takes Offensive Posture With Privacy Red Team
August 23 2022Engineering manager Scott Tenaglia describes how Meta extended the security red team model to aggressively protect data privacy.
Read more
Recent Comments