It's a classic attacker move: Use security protections against those who deploy them. But organizations can still defuse and prevent these encrypted attacks.
Read moreDescope Handles Authentication So Developers Don’t Have To
February 16 2023Developers don't have to build authentication and user management from scratch, and can devote their energies to the core functions of the application, instead.
Read moreOligo Security Takes Aim at Open Source Vulnerabilities
February 16 2023The startup's software helps organizations secure their containers in the cloud by teasing out which packages are running and which are vulnerable.
Read moreChatGPT Subs In as Security Analyst, Hallucinates Only Occasionally
February 16 2023Incident response triage and software vulnerability discovery are two areas where the large language model has demonstrated success, although false positives are common.
Read moreBrivo Reveals Top Security Trends for 2023: Convenience Is King in Securing the Hybrid Workplaces of the Future
February 16 2023Factoring user experience and convenience into how employees and tenants access buildings is top concern for security professionals says benchmark industry survey.
Read moreCall for Speakers Now Open for the RH-ISAC Cyber Intelligence Summit
February 16 2023Retail & Hospitality ISAC invites industry leaders, experts, and innovators to submit proposals for presentations and panel discussions.
Read moreGAO Calls for Improved Data Privacy Protections
February 16 2023US federal watchdog agency outlines key measures for better protecting sensitive data under the federal government's control.
Read more2023 Is the Year of Risk: 5 Ways to Prepare
February 16 20232022 saw a record number of cyberattacks. In response, regulators are prescribing how companies should manage their risks. How do you prepare?
Read more3 Ways CISOs Can Lead Effectively and Avoid Burnout
February 16 2023Information security is a high-stakes field with sky-high expectations. Here's how CISOs can offset the pressures and stay healthy.
Read moreWhat Purple Teams Wish Companies Knew
February 16 2023Here are some of the easily avoidable mistakes most companies made last year, gleaned from hundreds of cybersecurity engagements by red and blue teams.
Read more
Recent Comments