Is Data Security Worthless if the Data Life Cycle Lacks Clarity?
December 17 2021If you cannot track, access, or audit data at every stage of the process, then you can't claim your data is secure.
Read moreIf you cannot track, access, or audit data at every stage of the process, then you can't claim your data is secure.
Read moreThe new API and SDK from Pixalate helps mobile developers avoid getting their apps delisted from app stores by detecting and blocking fraudulent traffic.
Read moreThe new API and SDK from Pixalate helps mobile developers avoid getting their apps delisted from app stores by detecting and blocking fraudulent traffic.
Read moreThe Log4j flaw exists in a component that is not always easy to detect and is widely used beyond an organization's own networks and systems.
Read moreA new variant dubbed "Twizt" has hijacked 969 transactions and stolen the equivalent of nearly $500,000 USD.
Read moreA new variant dubbed "Twizt" has hijacked 969 transactions and stolen the equivalent of nearly $500,000 USD.
Read moreA look at why this is such a tricky vulnerability and why the industry response has been good, but not great.
Read moreA 24-year-old New York man who bragged about helping to steal more than $20 million worth of cryptocurrency from a technology executive has pleaded guilty to conspiracy to commit...
Read moreLatest episode - listen now! (Yes, there are plenty of critical things to go along with Log4Shell.)
Read moreLog4j is being exploited by all sorts of attackers, all over the Internet:
At that point it was reported that there were over 100 attempts to exploit the vulnerability...
Read more
Recent Comments