Why CVE Management as a Primary Strategy Doesn’t Work
November 11 2022With only about 15% of vulnerabilities actually exploitable, patching every vulnerability is not an effective use of time.
Read moreWith only about 15% of vulnerabilities actually exploitable, patching every vulnerability is not an effective use of time.
Read moreHere in 2022, we have a newly declassified 2016 Inspector General report—”Misuse of Sigint Systems”—about a 2013 NSA program that resulted in the unauthorized (that is, illegal) targeting of...
Read moreOkta Worforce Identity Cloud has all three identity functions -- identity access management, identity governance, and privilege access management -- under the hood.
Read moreThe line between criminal and political aims has become blurred, but motivations matter less than the effects of a breach.
Read morePIN-locked SIM card? No problem. It's easy for an attacker to bypass the Google Pixel lock screen on unpatched devices.
Read moreWe commend vets in cyber, with this look at how the training and experience of former military personnel can be a big, differentiating asset in cybersecurity environments.
Read moreLea Kissner was one of three senior executives to quit this week, leaving many to wonder if the social media giant is ripe for a breach and FTC action.
Read moreA dual Russian-Canadian citizen is being extradited to the US to face charges related to LockBit ransomware activities.
Read moreA nonprofit organization is suing the state of Massachusetts on behalf of thousands of low-income families who were collectively robbed of more than a $1 million in food assistance...
Read morePatches, busts, leaks and why even low-likelihood exploits can be high-severity risks - listen now!
Read more
Recent Comments