Time to Reset the Idea of Zero Trust
December 17 2021CISOs are increasingly drawn to the zero trust security model, but implementing a frictionless experience is still a challenge.
Read moreCISOs are increasingly drawn to the zero trust security model, but implementing a frictionless experience is still a challenge.
Read moreThe Cybersecurity Infrastructure and Security Agency orders federal agencies to take actions to mitigate vulnerabilities to the Apache Log4j flaw and attacks exploiting it.
Read moreIf you cannot track, access, or audit data at every stage of the process, then you can't claim your data is secure.
Read moreThe new API and SDK from Pixalate helps mobile developers avoid getting their apps delisted from app stores by detecting and blocking fraudulent traffic.
Read moreThe new API and SDK from Pixalate helps mobile developers avoid getting their apps delisted from app stores by detecting and blocking fraudulent traffic.
Read moreThe Log4j flaw exists in a component that is not always easy to detect and is widely used beyond an organization's own networks and systems.
Read moreA new variant dubbed "Twizt" has hijacked 969 transactions and stolen the equivalent of nearly $500,000 USD.
Read moreA new variant dubbed "Twizt" has hijacked 969 transactions and stolen the equivalent of nearly $500,000 USD.
Read moreA look at why this is such a tricky vulnerability and why the industry response has been good, but not great.
Read moreA 24-year-old New York man who bragged about helping to steal more than $20 million worth of cryptocurrency from a technology executive has pleaded guilty to conspiracy to commit...
Read more
Recent Comments