How Do I Conduct a Resilience Review?
April 12 2022As the first step, make sure that all business-critical data across your organization is protected.
Read moreAs the first step, make sure that all business-critical data across your organization is protected.
Read moreThe U.S. Department of Justice (DOJ) said today it seized the website and user database for RaidForums, an extremely popular English-language cybercrime forum that sold access to more than...
Read moreOpen source code continues its steady takeover of codebases, and organizations have made slight gains in eliminating out-of-date and vulnerable components.
Read moreFortunately, we're not talking about a robot revolution, or about hospital AI run amuck. But these bugs could lead to ransomware, or worse...
Read moreJohn Oliver has an excellent segment on data brokers and surveillance capitalism.
Read moreLike zero trust, the cybersecurity mesh re-envisions the perimeter at the identity layer and centers upon unifying disparate security tools into a single, interoperable ecosystem.
Read moreThe software supply chain security tool from GitHub and Google uses GitHub Actions and Sigstore to generate a "tamper-proof" record describing where, when, and how the software is produced.
Read moreFormer DHS employees targeted confidential, proprietary software and personally identifying information (PII) for hundreds of thousands of federal employees.
Read moreSecurity industry expert who spearheaded healthcare cybersecurity efforts passes away at age 46.
Read moreImprivata will unlock further value for customers by unifying, integrating, and automating digital identity to enable autonomous identity systems.
Read more
Recent Comments