New study shows sharp increase in number of endpoint devices with sensitive data on them.
Read moreGoogle Discovers New Rowhammer Attack Technique
May 26 2021Researchers publish the details of a new Rowhammer vulnerability called "Half-Double" that exploits increasingly smaller DRAM chips.
Read moreZscaler Buys Deception Technology Startup
May 26 2021ZScaler's CEO says Smokescreen Technologies' capabilities will be integrated with Zscaler's ZIA and ZPA products.
Read moreSPONSORED: WATCH NOW -- All it took was a global pandemic and a shift to working from home to expose security operations centers' open secret: Too much software, systems,...
Read moreBug Bounties and the Cobra Effect
May 26 2021Are bug bounty programs allowing software companies to skirt their responsibility to make better, more secure products from the get-go?
Read moreFrom limiting claims payments to tying payments to policyholders' actions, the cyber insurance industry is in "a very dynamic place right now," says Corvus Insurance CEO Phil Edmundson.
Read moreSPONSORED: WATCH NOW -- Some organizations split the difference with a hybrid of premises- and cloud-based SIEM, says Ted Julian, senior VP of product at Devo. As security data...
Read moreLatest episode - listen now. (And please leave us a review if you like what you hear!)
Read moreNew Disk Wiping Malware Targets Israel
May 26 2021Apostle seems to be a new strain of malware that destroys data. In a post published Tuesday, SentinelOne researchers said they assessed with high confidence that based on the code...
Read moreTelegram and other secure messaging apps have become a haven for professional criminals to wreak havoc and turn a profit.
Read more
Recent Comments