Listen now - latest episode. Full transcript inside.
Read moreThe Board of Directors Will See You Now
March 24 2023Help the board understand where the business is vulnerable, where controls end, and where exposure begins.
Read moreEnterprise storage devices have 14 security weaknesses on average, putting them at risk of compromise by cyberattackers and especially ransomware attacks.
Read moreMITRE Rolls Out Supply Chain Security Prototype
March 24 2023Cloud-based System of Trust application now available for test-driving quantitative risk assessment of suppliers of hardware, software, services.
Read moreJelle Wieringa analyzes the differences between HDR and security awareness training and how HDR addresses the security layer of human risk management.
Read moreOkta Post-Exploitation Method Exposes User Passwords
March 23 2023Accidentally typing a password in the username field of the platform saves them to audit logs, to which threat actors can gain access and use to compromise enterprise services.
Read moreDMARC blocks spam and phishing emails sent from spoofed domains, and it's vastly underutilized, a new report says.
Read moreDMARC blocks spam and phishing emails sent from spoofed domains, and it's vastly underutilized, a new report says.
Read moreIn the triumvirate of identity types, protecting the identity, privacy, and data of carbon-based forms — humans — is key. Safeguards must be in place as AI becomes more...
Read moreMass Ransomware Attack
March 23 2023A vulnerability in a popular data transfer tool has resulted in a mass ransomware attack:
TechCrunch has learned of dozens of organizations that used the affected GoAnywhere file transfer...
Read more
Recent Comments