New Research From EMA Reveals How Organizations Are Struggling to Develop Secure Software Applications
January 19 2023Research shows that over 50% of organizations performing software development struggle with fully integrating security into their software development lifecycle.
Read moreCybercriminals Target Telecom Provider Networks
January 19 2023The growing use of mobile devices for MFA and the proliferation of 5G and VoIP in general could result in more attacks in future, experts say.
Read moreSecurity Analysis of Threema
January 19 2023A group of Swiss researchers have published an impressive security analysis of Threema.
We provide an extensive cryptographic analysis of Threema, a Swiss-based encrypted messaging application with more than...
Read more
Craft specific awareness training for high-exposure teams like finance, and reinforce other critical awareness training across the organization.
Read moreData Security in Multicloud: Limit Access, Increase Visibility
January 19 2023Ensuring that data can be easily discovered, classified, and secured is a crucial cornerstone of a data security strategy.
Read moreHow Would the FTC Rule on Noncompetes Affect Data Security?
January 19 2023Without noncompetes, how do organizations make sure employees aren't taking intellectual property when they go work to work for a competitor?
Read moreVulnerable Historian Servers Imperil OT Networks
January 19 2023These specialized database servers, which collect and archive information on device operation, often connect IT and OT networks.
Read moreSophos Cuts Jobs to Focus on Cybersecurity Services
January 19 2023Layoffs intended to cut costs, help company shift its focus on cybersecurity services, Sophos says.
Read more
Recent Comments