Researchers discover 3-year-old critical firmware vulnerability, running in popular cloud servers used to power hyperscalers and cloud providers alike.
Read moreWhen you really need to make exceptions in cybersecurity, specify them as explicitly as you can.
Read moreMalware-Infested Smart Card Reader
May 26 2022Brian Krebs has an interesting story of a smart ID card reader with a malware-infested Windows driver, and US government employees who inadvertently buy and use them. But by all...
Read moreMost Common Threats in DBIR
May 25 2022Supply chain and ransomware attacks increased dramatically this year, which explains why so many data breaches in this year's DBIR were grouped as system intrusion.
Read moreForescout Launches Forescout Frontline to Help Organizations Tackle Ransomware and Real Time Threats
May 25 2022New threat hunting and risk identification service provides organizations with an enterprise-wide baseline of their threat landscape and risk exposure.
Read moreIs Your Data Security Living on the Edge?
May 25 2022Gartner's security service edge fundamentally changes how companies should be delivering data protection in a cloud and mobile first world.
Read moreA sprawling, multiyear operation nabs a suspected SilverTerrier BEC group ringleader, exposing a massive attack infrastructure and sapping the group of a bit of its strength.
Read moreOpen source software community initiative utilizes blockchain technology.
Read moreOpen source software community initiative utilizes blockchain technology.
Read moreExperience Centre features emerging Mastercard products and solutions for securing digital payments on a global scale, including those developed locally in Vancouver.
Read more
Recent Comments