Better Collaboration Between Security & Development
June 25 2020Security and development teams must make it clear why their segment of the development life cycle is relevant to the other teams in the pipeline.
Read moreSecurity and development teams must make it clear why their segment of the development life cycle is relevant to the other teams in the pipeline.
Read moreThe recent spread of the distributed denial-of-service tool attempts to exploit a dozen web-framework flaws, uses credential stuffing, and is intended to work against a variety of operating systems.
Read moreKernel driver bugs often let crooks take over your entire system from even the weediest foothold.
Read moreAdvanced persistent threat (APT) campaign aims to steal intelligence secrets from foreign companies operating in China.
Read moreNew research: "Best Practices for IoT Security: What Does That Even Mean?" by Christopher Bellman and Paul C. van Oorschot: Abstract: Best practices for Internet of Things (IoT) security...
Read moreTwitter emailed business clients to tell them that their financial data may have been seen by the uninvited.
Read moreThe fleet management company becomes part of Apple in a deal announced today.
Read moreGovernment-mandated Internet shutdowns occur far more regularly than you might expect.
Read moreSensitivity of customer information and time-to-detection determine financial blowback of cybersecurity breaches.
Read moreI fly a lot. Over the past five years, my average speed has been 32 miles an hour. That all changed mid-March. It's been 105 days since I've been...
Read more
Recent Comments