The effect is nuanced — and fundamental to cyber defense for organizations and nations.
Read moreWe shouldn't need to say, "Check your inputs!" these days, but we're saying it anyway.
Read moreFinding Vulnerabilities in Open Source Projects
February 2 2022The Open Source Security Foundation announced $10 million in funding from a pool of tech and financial companies, including $5 million from Microsoft and Google, to find...
Read moreNo specific threats against the Olympics, according to the FBI, but instead it's about vigilance against potential ones.
Read more8 Security Dinosaurs and What Filled Their Footprints
February 2 2022Security technology has to evolve as new threats emerge and defenses improve. Here is a look back at the old breeds that are dying out.
Read moreThe social media platform's global security chief boils it down to being consistent, keeping it fun, and demonstrating the impact of choices.
Read moreNow-patched issue in Essential Addons for Elementor gives attackers a way to carry out local file inclusion attacks, researchers say.
Read moreEnterprise security teams can use secure web browsers to apply controls and governance to cloud applications and customer data.
Read moreEnterprise security teams can use secure web browsers to apply controls and governance to cloud applications and customer data.
Read moreThycoticCentrify Renamed Delinea
February 1 2022Privileged access management vendor rebrands.
Read more
Recent Comments