Shadow IT, SaaS Pose Security Liability for Enterprises
April 22 2023Software written or acquired outside of IT's purview is software that IT can't evaluate for security or compliance.
Read moreSoftware written or acquired outside of IT's purview is software that IT can't evaluate for security or compliance.
Read moreThis a good example of a security feature that can sometimes harm security:
Apple introduced the optional recovery key in 2020 to protect users from online hackers. Users...
Read more
Attackers have their methods timed to the second, and they know they have to get in, do their damage, and get out quickly. CISOs today must detect and block...
Read moreWe learned some remarkable new details this week about the recent supply-chain attack on VoIP software provider 3CX, a complex, lengthy intrusion that has the makings of a cyberpunk...
Read moreA bug in how Google Cloud Platform handles OAuth tokens opened the door to Trojan apps that could access anything in users' personal or business Google Drives, Photos, Gmail,...
Read moreThe new Security Legal Research Fund and the Hacking Policy Council are aimed at protecting "good faith" security researchers from legal threats and giving them a voice in policy...
Read moreThe Open Source Security Foundation's SLSA v1.0 release is an important milestone in improving software supply chain security and providing organizations with the tools they need to protect their...
Read more
Recent Comments