At Black Hat USA, Igal Gofman plans to address how machine identities in the cloud and the explosion of SaaS apps are creating risks for IAM, amid escalating attention...
Read moreA month after the algorithms were revealed, some companies have already begun incorporating the future standards into their products and services.
Read moreA dangerous VMware authentication-bypass bug could give threat actors administrative access over virtual machines.
Read moreThe CVE-2022-27535 local privilege-escalation security vulnerability in the security software threatens remote and work-from-home users.
Read moreHow Email Security Is Evolving
August 4 2022Securing email communication has never been more critical for organizations, and it has never been more challenging to do so. Attack volumes have increased and become more sophisticated.
Read moreS3 Ep94: This sort of crypto (graphy), and the other sort of crypto (currency!) [Audio + Text]
August 4 2022Latest episode - listen now! (Or read if that's what you prefer.)
Read moreScammers Sent Uber to Take Elderly Lady to the Bank
August 4 2022Email scammers sent an Uber to the home of an 80-year-old woman who responded to a well-timed email scam, in a bid to make sure she went to the...
Read moreA global network of inauthentic news sites present themselves as independent news outlets, offering content favoring China's government and articles critical of the US.
Read moreA global network of inauthentic news sites present themselves as independent news outlets, offering content favoring China's government and articles critical of the US.
Read morePhylum Releases a Free Community Edition to Make Software Supply Chain Security More Accessible
August 4 2022Users can identify risks across five domains, work on multiple projects, and take advantage of exclusive community benefits.
Read more
Recent Comments