Half of companies had at least one case of having all ports open to the public, while more than a third had an exposed database.
Read moreThe IT and OT security providers will integrate solutions aimed at improving critical infrastructure security
Read moreWhen AI Becomes the Hacker
May 13 2021Bruce Schneier explores the potential dangers of artificial intelligence (AI) systems gone rogue in society.
Read moreNew capabilities let admins restrict access to resources from privileged access workstations or regions based on GPS location.
Read moreBusiness continuity plans that address natural and manmade disasters can help turn a cataclysmic business event into a minor slowdown.
Read moreCybersecurity attackers follow the same principles practiced in warfare for millennia. They show up in unexpected places, seeking out portions of an organization's attack surface that are largely unmonitored...
Read moreVerizon's Data Breach Investigations Report (DBIR) covers 2020 -- a year like no other. Phishing, ransomware, and innovation caused big problems.
Read moreMany organizations remain unprepared to detect, respond, and contain a breach, a new survey shows.
Read moreThe apps are disguised as financial trading, banking, and cryptocurrency apps from well-known and trusted organizations.
Read more
Recent Comments