You'll find fixes for numerous kernel-level code execution holes, including an 0-day vulnerability in many (though not all) versions.
Read moreRFT is expanding the Safe Place hospital market security system to include staff protection.
Read more50% of Orgs Rely on Email to Manage Security
May 16 2022Even with dedicated identity management tools at their disposal, many companies — smaller ones especially — are sticking with email and spreadsheets for handling permissions.
Read moreWireless chips that run when the iPhone iOS is shut down can be exploited.
Read moreMaintainers of open source software (OSS) will gain additional security tools for their own projects, while the developers who use OSS — and about 97% of software does —...
Read moreYou Can’t Opt Out of Citizen Development
May 16 2022To see why low-code/no-code is inevitable, we need to first understand how it finds its way into the enterprise.
Read moreNew quantum encryption standards will stand up to spy-snooping, NSA cybersecurity director said.
Read moreName That Toon: Knives Out
May 16 2022Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
Read moreJust one day after disclosure, cyberattackers are actively going after the command-injection/code-execution vulnerability in Zyxel's gear.
Read moreIn a Black Hat Asia keynote fireside chat, US national cyber director Chris Inglis outlined his vision of an effective cybersecurity public-private partnership strategy.
Read more
Recent Comments