Reducing Risk With Zero Trust
June 21 2022Zero trust isn’t just about authentication. Organizations can combine identity data with business awareness to address issues such as insider threat.
Read moreZero trust isn’t just about authentication. Organizations can combine identity data with business awareness to address issues such as insider threat.
Read moreDeep-dive study unearthed security flaws that could allow remote code execution, file manipulation, and malicious firmware uploads, among other badness.
Read moreAI can help companies more effectively identify and respond to threats, as well as harden applications.
Read moreOnly about half of firms have an open source software security policy in place to guide developers in the use of components and frameworks, but those that do exhibit...
Read moreTwo bills attempting to reduce the power of Internet monopolies are currently being debated in Congress: S. 2992, the American Innovation and Choice Online Act; and S. 2710,...
Read moreAfter bragging in underground forums, the woman who stole 100 million credit applications from Capital One has been found guilty.
Read moreRSOCKS commandeered millions of devices in order to offer proxy services used to mask malicious traffic.
Read moreFriends don't let friends get scammed. Not everyone knows how typical scams unfold, so here are some real-world examples...
Read moreCheck out the handmade sign posted to the front door of a shuttered Jimmy John's sandwich chain shop in Missouri last week. See if you can tell from the...
Read moreFeeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
Read more
Recent Comments