CERT-In updates cybersecurity rules to include mandatory reporting, record-keeping, and more.
Read moreA California man faces prison time and steep fines stemming from cybertheft of US military funds intended to pay jet-fuel suppliers.
Read moreSecurity must be precise enough to meet compliance requirements without impeding DevOps and developer productivity. Here's how to strike that balance.
Read moreName That Edge Toon: Flower Power
May 2 2022Come up with a clever caption, and our panel of experts will reward the winner with a $25 Amazon gift card.
Read moreBreaches can happen to anyone, but a well-oiled machine can internally manage and externally remediate in a way that won't lead to extensive damage to a company's bottom line....
Read more2022 Security Priorities: Staffing and Remote Work
April 30 2022A comprehensive security strategy balances technology, processes, and people — and hiring and retaining security personnel and securing the remote workforce are firmly people priorities.
Read moreGood News! IAM Is Near-Universal With SaaS
April 29 2022The less-good news: IAM only works for applications your IT department knows about, so watch for "shadow IT" programs installed or written by users that leave a security gap.
Read moreQNAP and Synology say flaws in the Netatalk fileserver allow remote code execution and information disclosure.
Read moreThis scale of this month's encrypted DDoS attack over HTTPS suggests a well-resourced operation, analysts say.
Read more
Recent Comments