Research Finds Nearly 800,000 Access Keys Exposed Online
September 15 2020The keys were primarily for access to databases and cloud services.
Read moreThe keys were primarily for access to databases and cloud services.
Read moreFinding threats in encrypted inbound network traffic is complex and expensive for enterprises, but a fascinating new approach could eliminate the need for decryption.
Read moreBy building a privacy-forward culture from the ground up and automating processes, organizations can simplify their approach to privacy and be prepared for any upcoming regulations.
Read moreThis is a current list of where and when I am scheduled to speak: I’m speaking at the Cybersecurity Law & Policy Scholars Virtual Conference on September 17, 2020. I’m keynoting...
Read moreIn a letter, almost 70 different security firms and individual researchers criticize Voatz for misrepresenting to the US Supreme Court widely accepted security research practices.
Read morePen-test results also show a majority of organizations have few protections against attackers already on the network.
Read moreThe campaign targeted sites running Magento Version 1, a version of the e-commerce software that is past end-of-life.
Read moreAn expert in economics and cybersecurity applies opportunity cost and other concepts of the "dismal science" to infosec roles.
Read moreMany organizations operating in e-commerce, hospitality, healthcare, managed services, and other service industries rely on web applications. And buried within the application logs may be the ...
Read more
Recent Comments