A Pragmatic Response to the Quantum Threat
September 8 2022You certainly don't need to panic, but you do need to form a plan to prepare for the post-quantum reality.
Read moreYou certainly don't need to panic, but you do need to form a plan to prepare for the post-quantum reality.
Read moreFrom analyzing your company's risk profile to knowing where keys are stored and who can access them, prioritize key clean-up and management. Make compliance an outcome and develop a...
Read moreInstagram and Facebook parent company Meta was slapped with the fine for exposing the personal data of minors.
Read moreA slew of Microsoft Exchange vulnerabilities (including ProxyLogon) fueled a surge in attacks targeting software flaws in 2021, but the trend has continued this year.
Read moreThis is from a court deposition:
Facebook’s stonewalling has been revealing on its own, providing variations on the same theme: It has amassed so much data on so many...
Read more
The initial access broker (IAB) for ransomware gangs known as UAC-0098 has targeted Ukrainian organizations in five separate phishing campaigns spanning April to August.
Read moreInvestment to fuel growth and market presence as demand grows for SaaS' next-generation security tools for managed service providers.
Read moreLatest episode - listen now! (Or read if you prefer - full transcript inside.)
Read morePenetration testing not only serves to triage and validate other defect discovery activities, it informs risk management activities, such as threat modeling and secure design.
Read moreAfter a high-profile 2017 breach and a Holiday Inn ransomware hit earlier this year, IHG confirms that its booking channels and applications have been disrupted in yet another cyberattack.
Read more
Recent Comments