Netflix's unpopular password-sharing policy change had a positive cybersecurity silver lining. Can more B2C service providers nudge their users toward secure authentication?
Read moreMicrosoft says the vulnerability could allow cyberattackers with root access to bypass security protections and install malware.
Read moreTo support and retain the people who protect assets against bad actors, organizations should create a more defensible environment.
Read moreApple's Rapid Security Response updates are designed to patch critical security vulnerabilities, but how much good can they do when patching is a weeks-long process?
Read moreThere's still a great deal of capital available for innovative companies helping businesses secure their IT environments.
Read morePowered by GPT-4, innovative new AI-driven capabilities lower application security (AppSec) risk and help security teams "shift everywhere" with speed and accuracy.
Read moreThe European Commission voted a new electronic identification scheme that creates new opportunities for EU citizens and businesses.
Read moreResearchers have observed several cyberattacks leveraging a botnet called IZ1H9, which exploits vulnerabilities in exposed devices and servers running on Linux.
Read moreBy finding the places where attack paths converge, you can slash multiple exposures in one fix for more efficient remediation.
Read more
Recent Comments