A global network of inauthentic news sites present themselves as independent news outlets, offering content favoring China's government and articles critical of the US.
Read morePhylum Releases a Free Community Edition to Make Software Supply Chain Security More Accessible
August 4 2022Users can identify risks across five domains, work on multiple projects, and take advantage of exclusive community benefits.
Read moreThe Myth of Protection Online — and What Comes Next
August 4 2022It's a myth that consuming and processing alerts qualifies as security. Today's technology allows better detection and prevention, rather than accepting the low bar for protection set by ingrained...
Read moreDeep Instinct Pioneers Deep-Learning Malware Prevention to Protect Mission-Critical Business Applications at Scale
August 4 2022Agentless approach meets the attacker earlier to protect financial services and other large enterprises from an underserved attack vector.
Read moreIn the last month, "Pl0xP" cloned several GitHub repositories, adding malicious code to the forks that would attempt to infect developer systems and steal sensitive files that included software...
Read morePing Identity to Go Private After $2.8B Acquisition
August 4 2022The identity-services company is being acquired by Thoma Bravo software investment for cash, before being delisted.
Read moreNew Startup Footprint Tackles Identity Verification
August 3 2022Early-stage startup Footprint's goal is to provide tools that change how enterprises verify, authentication, authorize, and secure identity.
Read moreCopado's Kyle Tobener will discuss a three-pronged plan at Black Hat USA for addressing human weaknesses in cybersecurity with this medical concept — from phishing to shadow IT.
Read moreCopado's Kyle Tobener will discuss a three-pronged plan at Black Hat USA for addressing human weaknesses in cybersecurity with this medical concept — from phishing to shadow IT.
Read more
Recent Comments