Faced with a brain drain of smart people fleeing the country following its invasion of Ukraine, the Russian Federation is floating a new strategy to address a worsening shortage...
Read moreThe security vulnerability payout set bug hunters rejoicing, but claiming the reward is much, much easier said than done.
Read moreCERT-In updates cybersecurity rules to include mandatory reporting, record-keeping, and more.
Read moreA California man faces prison time and steep fines stemming from cybertheft of US military funds intended to pay jet-fuel suppliers.
Read moreSecurity must be precise enough to meet compliance requirements without impeding DevOps and developer productivity. Here's how to strike that balance.
Read moreName That Edge Toon: Flower Power
May 2 2022Come up with a clever caption, and our panel of experts will reward the winner with a $25 Amazon gift card.
Read moreBreaches can happen to anyone, but a well-oiled machine can internally manage and externally remediate in a way that won't lead to extensive damage to a company's bottom line....
Read more2022 Security Priorities: Staffing and Remote Work
April 30 2022A comprehensive security strategy balances technology, processes, and people — and hiring and retaining security personnel and securing the remote workforce are firmly people priorities.
Read moreGood News! IAM Is Near-Universal With SaaS
April 29 2022The less-good news: IAM only works for applications your IT department knows about, so watch for "shadow IT" programs installed or written by users that leave a security gap.
Read moreQNAP and Synology say flaws in the Netatalk fileserver allow remote code execution and information disclosure.
Read more
Recent Comments