In the latest incarnation of the TLStorm vulnerability, switches from Avaya and Aruba — and perhaps others — are susceptible to compromise from an internal attacker.
Read moreIn the latest incarnation of the TLStorm vulnerability, switches from Avaya and Aruba — and perhaps others — are susceptible to compromise from an internal attacker.
Read moreFaced with a brain drain of smart people fleeing the country following its invasion of Ukraine, the Russian Federation is floating a new strategy to address a worsening shortage...
Read moreThe security vulnerability payout set bug hunters rejoicing, but claiming the reward is much, much easier said than done.
Read moreCERT-In updates cybersecurity rules to include mandatory reporting, record-keeping, and more.
Read moreA California man faces prison time and steep fines stemming from cybertheft of US military funds intended to pay jet-fuel suppliers.
Read moreSecurity must be precise enough to meet compliance requirements without impeding DevOps and developer productivity. Here's how to strike that balance.
Read moreName That Edge Toon: Flower Power
May 2 2022Come up with a clever caption, and our panel of experts will reward the winner with a $25 Amazon gift card.
Read moreBreaches can happen to anyone, but a well-oiled machine can internally manage and externally remediate in a way that won't lead to extensive damage to a company's bottom line....
Read more2022 Security Priorities: Staffing and Remote Work
April 30 2022A comprehensive security strategy balances technology, processes, and people — and hiring and retaining security personnel and securing the remote workforce are firmly people priorities.
Read more
Recent Comments