Where Can Third-Party Governance and Risk Management Take Us?
November 16 2022Part 2 in our series addressing the top 10 unanswered questions in security: How will TPGRM evolve?
Read morePart 2 in our series addressing the top 10 unanswered questions in security: How will TPGRM evolve?
Read moreWeak configurations for encryption and missing security headers topped the list of software issues found during a variety of penetration and application security tests.
Read moreTesting is an ongoing mission, not a one-and-done fix.
Read moreGood old "string templating", also known as "string interpolation", in the spotlight again...
Read moreA misleading location-tracking practice ensnared the search-engine giant in massive privacy case spanning 40 states.
Read moreVyacheslav “Tank” Penchukov, the accused 40-year-old Ukrainian leader of a prolific cybercriminal group that stole tens of millions of dollars from small to mid-sized businesses in the United States...
Read moreThe API-related vulnerabilities put conversations, email addresses, tickets, and more in danger of exposure via the Zendesk Explore reporting service.
Read moreAs the threat landscape increases, public cloud security needs to evolve.
Read more
Recent Comments