Get Started on Continuous Compliance Ahead of PCI DSS v4.0
February 8 2022Here's what vendors can do to prepare in the time remaining before the final release of PCI DSS 4.0 this quarter.
Read moreHere's what vendors can do to prepare in the time remaining before the final release of PCI DSS 4.0 this quarter.
Read moreRecent attacks involving so-called "right-to-left override" spoofing aimed at Microsoft 365 users show how attackers sometimes modify and improve old methods to try and stay one step ahead of...
Read moreCompanies are scanning more applications for vulnerabilities — and more often.
Read moreWith its benefits of deniability, relatively low costs, and the ability to attack from anywhere, cyber terrorism will increasingly threaten civilians everywhere.
Read moreAmy Zegart has a new book: Spies, Lies, and Algorithms: The History and Future of American Intelligence. Wired has an excerpt:
In short, data volume and accessibility are...
Read more
It's been a long time coming, and we're not there yet, but at least Microsoft Office will be a bit safer against macro malware...
Read moreQualys Context XDR provides the security context that operations teams need to eliminate false positives and noise by triangulating risk posture, asset criticality, and threat intelligence.
Read moreInterVision RPaaS solution provides protection, response, and recovery in one managed service.
Read moreFunding round was led by Differential Ventures, an artificial intelligence and cybersecurity seed venture fund.
Read moreSome companies go too fast when it comes to SaaS, DevOps, and security, but smart developers and implementers will respect some basic guidelines to keep their product safe.
Read more
Recent Comments