To support and retain the people who protect assets against bad actors, organizations should create a more defensible environment.
Read moreApple's Rapid Security Response updates are designed to patch critical security vulnerabilities, but how much good can they do when patching is a weeks-long process?
Read moreHere, in an admittedly discursive nutshell, is the fascinating story of CVE-2023-32784. (Short version: Don't panic.)
Read moreThere's still a great deal of capital available for innovative companies helping businesses secure their IT environments.
Read morePowered by GPT-4, innovative new AI-driven capabilities lower application security (AppSec) risk and help security teams "shift everywhere" with speed and accuracy.
Read moreThe European Commission voted a new electronic identification scheme that creates new opportunities for EU citizens and businesses.
Read moreResearchers have observed several cyberattacks leveraging a botnet called IZ1H9, which exploits vulnerabilities in exposed devices and servers running on Linux.
Read moreChinese Hacking of US Critical Infrastructure
May 31 2023Everyone is writing about an interagency and international report on Chinese hacking of US critical infrastructure. Lots of interesting details about how the group, called Volt Typhoon, accesses target networks...
Read moreBy finding the places where attack paths converge, you can slash multiple exposures in one fix for more efficient remediation.
Read moreSome companies have moved on from using Salesforce. But without remembering to fully deactivate their clouds, Salesforce won't move on from them.
Read more
Recent Comments