Happy Social Media Day! Make it a day to review whether your social media security really is up to scratch.
Read moreThe Open Source Vulnerability schema supports automated vulnerability handling in Go, Rust, Python, and Distributed Weakness Filing system, and it could be the favored format for future exporting of...
Read moreRansomware Losses Drive Up Cyber-Insurance Costs
June 29 2021Premiums have gone up by 7% on average for small firms and between 10% and 40% for medium and large businesses.
Read moreCISA Publishes Catalog of Poor Security Practices
June 29 2021Organizations often focus on promoting best practices, CISA says, but stopping poor security practices is equally important.
Read moreSurvey data reveals many people have never heard of major cyberattacks, including the attack targeting Colonial Pipeline.
Read moreAddressing the complexity of modern distributed software development is one of the most important things we can do to decrease supply chain risk.
Read moreRisks of Evidentiary Software
June 29 2021
Over at Lawfare, Susan Landau has an excellent essay on the risks posed by software used to collect evidence (a Breathalyzer is probably the most obvious example).
Bugs...
Read more3 Ways Cybercriminals Are Undermining MFA
June 29 2021Using multifactor authentication is an excellent security step, but like everything else, it is not foolproof and will never be 100% effective.
Read moreMicrosoft Refining Third-Party Driver Vetting Processes After Signing Malicious Rootkit
June 28 2021Rogue driver was distributed within gaming community in China, company says.
Read moreThe company suspects a remote code execution vulnerability affecting My Book Live and My Book Live Duo devices and recommends that business and individual users turn off the drives...
Read more
Recent Comments