Security pros say the Log4j vulnerability is another warning call for enterprises to get more disciplined when keeping track of software bills of materials.
Read moreName That Edge Toon: In Your Face!
January 3 2022Come up with a clever caption, and our panel of experts will reward the winner with a $25 Amazon gift card.
Read moreCreating the Next Generation of Secure Developers
January 3 2022Helping management prioritize developer education is a tall order, but it's one the industry must figure out.
Read moreFriday Squid Blogging: Deep-Dwelling Squid
December 31 2021We have discovered a squid — (Oegopsida, Magnapinnidae, Magnapinna sp.) — that lives at 6,000 meters deep.
:They’re really weird,” says Vecchione. “They drift along with their arms spread...
Read more
Adding Resiliency to BGP Avoids Network Outages, Data Loss
December 31 2021Cisco Umbrella has mechanisms in place to ensure that end users don't lose connectivity even if ISPs and service providers experience outages.
Read moreApple AirTags Are Being Used to Track People and Cars
December 31 2021This development suprises no one who has been paying attention:
Researchers now believe AirTags, which are equipped with Bluetooth technology, could be revealing a more widespread problem of tech-enabled...
Read more
Getting Started With Threat-Informed Security Programs
December 30 2021Security leaders need to examine their business model, document risks, and develop a strategic plan to address those risks.
Read moreZero Trust and Access: Protecting the Keys to the Kingdom
December 30 2021Zero trust moves the control pane closer to the defended asset and attempts to tightly direct access and privileges.
Read moreInstagram copyright infringment scams – don’t get sucked in!
December 30 2021We deconstructed a copyright phish so you don't have to. Be warned: the crooks are getting better at these scams...
Read moreIn the Fight Against Cybercrime, Takedowns Are Only Temporary
December 30 2021Disrupting access to servers and infrastructure continues to interfere with cybercrime activity, but it's far from a perfect strategy.
Read more
Recent Comments