How to Control Security Costs During a Down Economy
August 19 2020Three key areas security professionals should watch when managing their budgets.
Read moreThree key areas security professionals should watch when managing their budgets.
Read moreUsers regularly reuse logins and passwords, and data thieves are leveraging that reality to breach multiple accounts.
Read moreSecurity vendor Prevailion says it observed signs of malicious activity on the cruise operator's network between at least February and June.
Read moreThe government is responding to threats targeting the GCKey service and CRA accounts, which are used to access federal services.
Read moreLatest attacks bank on the reputation of two prominent APT groups to increase the threat credibility.
Read moreResearchers who detected the attack explain what businesses should know about the HTML smuggling technique.
Read moreGitHub, used badly, can be a source of more vulnerabilities than successful collaborations. Here are ways to keep your development team from getting burned on GitHub.
Read moreIt's time to position quality and security as equals under the metric of software integrity.
Read more
Recent Comments