9 Hot Trends in Cybersecurity Mergers & Acquisitions
June 30 2021Security experts share their observations of the past year in cybersecurity M&A, highlighting key trends and notable deals.
Read moreSecurity experts share their observations of the past year in cybersecurity M&A, highlighting key trends and notable deals.
Read moreHappy Social Media Day! Make it a day to review whether your social media security really is up to scratch.
Read moreThe Open Source Vulnerability schema supports automated vulnerability handling in Go, Rust, Python, and Distributed Weakness Filing system, and it could be the favored format for future exporting of...
Read morePremiums have gone up by 7% on average for small firms and between 10% and 40% for medium and large businesses.
Read moreOrganizations often focus on promoting best practices, CISA says, but stopping poor security practices is equally important.
Read moreSurvey data reveals many people have never heard of major cyberattacks, including the attack targeting Colonial Pipeline.
Read moreAddressing the complexity of modern distributed software development is one of the most important things we can do to decrease supply chain risk.
Read more
Over at Lawfare, Susan Landau has an excellent essay on the risks posed by software used to collect evidence (a Breathalyzer is probably the most obvious example).
Bugs...
Read moreUsing multifactor authentication is an excellent security step, but like everything else, it is not foolproof and will never be 100% effective.
Read moreRogue driver was distributed within gaming community in China, company says.
Read more
Recent Comments