Others should boost their security controls to get in sync with AB 375… or get ready to be sued hundreds of dollars for each personal record exposed in a...
Read moreSecurity is a top priority when it comes to making decisions on payment methods and technologies. In the list of considerations for how to pay for purchases, the security...
Read moreSecurity is a top priority when it comes to making decisions on payment methods and technologies. In the list of considerations for how to pay for purchases, the security...
Read moreThe difference between red team engagements and vulnerability assessments | Salted Hash Ep 34
July 3 2018CSO Online | Jul 3, 2018 In this episode, host Steve Ragan talks with Phil Grimes, Professional Services Lead at RedLegg, about the challenges of educating customers — and...
Read moreThe difference between red team engagements and vulnerability assessments | Salted Hash Ep 34
July 3 2018CSO Online | Jul 3, 2018 In this episode, host Steve Ragan talks with Phil Grimes, Professional Services Lead at RedLegg, about the challenges of educating customers — and...
Read morePressure comes in many forms but often with the same end result: stress and burnout within the security community. (Image: Christian Schulz via Shutterstock) Every year, thousands of cybersecurity...
Read moreClipboard Hijackers are not a new threat, but this one shows attackers are getting more advanced. Cybercriminals have found a sneaky way to snatch more digital funds: Cryptocurrency Clipboard...
Read moreMicrosoft rolls out its cloud-based IoT service to the general public, while upping data protection with new categories including device management and security. Microsoft has made Azure IoT Edge...
Read more
Recent Comments