New research report finds most financial organizations have experienced a breach due to an authentication weakness, yet only a third took action
Read moreIn the wrong hands, the changes could enable state-sponsored internet surveillance says Mozilla's Chief Security Officer
Read moreMicrosoft reveals now-fixed flaw in Apple's App Sandbox controls could allow attackers to escalate device privileges and deploy malware.
Read moreMost organizations are flying blind when remediating vulnerabilities. We lack the tooling to secure software fast enough. We need a new approach to vulnerability management now.
Read moreMost organizations are flying blind when remediating vulnerabilities. We lack the tooling to secure software fast enough. We need a new approach to vulnerability management now.
Read moreTwo mostly defunct threats — WannaCry and NonPetya — top the list of ransomware searches, but does that mean they are still causing problems?
Read more3 Golden Rules of Modern Third-Party Risk Management
July 13 2022It's time to expand the approach of TPRM solutions so risk management is more effective in the digital world.
Read moreLast time they arrived 28 minutes after lighting up their fake domain... this time it was just 21 minutes
Read moreSurvey: Small Cybersecurity Teams Face Greater Risk from Attacks than Larger Enterprises
July 13 2022Cynet CISO survey reveals lack of staff, skills, and resources driving smaller teams to outsource security with advanced tools, technologies, and services.
Read more
Recent Comments