New research says IAM spending will grow on the back of affordable subscription services, spurred by cloud and mobile adoption, IoT, and continued remote working.
Read moreOrganizations must balance the risk and reward of new cyber-asset management technologies.
Read moreOur roundtable of cybersecurity experts weighs in on what makes QNAP network-attached storage catnip for attackers, and what organizations can do about it.
Read moreThe US Department of Commerce's National Institute of Standards and Technology (NIST) announced the first group of encryption tools that will become part of its post-quantum cryptographic standard.
Read moreCompany says it is making changes to its security controls to prevent malicious insiders from doing the same thing in future; reassures bug hunters their bounties are safe.
Read moreA widespread campaign uses more than 24 malicious NPM packages loaded with JavaScript obfuscators to steal form data from multiple sites and apps, analysts report.
Read moreAs a result of browser market consolidation, adversaries can focus on uncovering vulnerabilities in just two main browser engines.
Read moreThe heap buffer-overflow issue in Chrome for Android could be used for DoS, code execution, and more.
Read moreRunning Chrome? Do the "Help-About-Update" dance move right now, just to be sure...
Read moreCompanies need to consider the cost to disengage from the cloud along with proactive risk management that looks at governance issues resulting from heavy use of low- and no-code...
Read more
Recent Comments