A model of continuous authentication and identification is needed to keep consumers safe.
Read moreIn Memoriam: Remembering Those Who Passed
January 7 2023Security stands on the shoulders of giants. We take a moment to remember their contributions toward keeping people, data, and systems safe.
Read moreUsing command-and-control servers from the decade-old Andromeda malware, the group is installing reconnaissance tools and a backdoor on previously infected systems to target Ukrainian victims.
Read moreIn what's become a pattern, the cybercriminal ring stole data, demanded payment, and posted personal information when ransom was denied.
Read moreCISOs Are Focused on These 3 Trends. Are You?
January 7 2023The macro issues shaping the threat landscape can help security pros reset their priorities and reformulate strategy.
Read moreThe Automated Libra group is deploying all components of its campaign in an automated manner via containers, stealing free trial resources for cryptomining, but the threat could get larger.
Read moreSecurity vulnerabilities plague automakers, and as vehicles become more connected, a more proactive stance on cybersecurity will be required — alongside regulations.
Read moreDon’t Be Blindsided by Software Bills of Materials
January 6 2023It's imperative we collaborate and partner to improve software security. This may require developing tools and standards that can enrich SBOMs and provide deeper analysis.
Read moreThe role of artificial intelligence in cybersecurity is growing. A new AI model highlights the opportunities and challenges.
Read more
Recent Comments