7 Steps for Navigating a Zero-Trust Journey
December 29 2021Don't think of zero trust as a product. Think of it as "how you actually practice security."
Read moreDon't think of zero trust as a product. Think of it as "how you actually practice security."
Read moreOver 80% of Java packages stored on Maven Central Repository have log4j as an indirect dependency, with most of them burying the vulnerable version five levels deep, says Google's...
Read moreTo comply with the updated COPPA Rule, online ad platforms need to change how they handle viewers who might be children.
Read moreThe Business Security Test is a comprehensive investigation of corporate endpoint security solutions on the market.
Read moreRansomware demands a new approach to incident response.
Read moreSevere flaws in Microsoft Exchange and Windows Print Spooler stood out amid a wide range of vulnerabilities security teams were forced to prioritize in 2021.
Read moreThe principle of least level of access gives employees just the privileges they need to do their jobs. Limiting what an employee can do is a core tenet of...
Read moreTo protect their staffers, leaders should focus on identifying and alleviating root causes of burnout.
Read moreThe details on cybersecurity technologies that we expect to advance rapidly in the coming year.
Read moreSomeone left it in a cemetery. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog...
Read more
Recent Comments