A ransomware attack on Taiwanese electronics giant Foxconn has resulted in hackers demanding $34.7 million in Bitcoin. Cybercriminals infiltrated Foxconn’s networks on November 29, stealing and encrypting files and deleting...
Despite the explosive growth in API usage worldwide, many security and development teams are unable to answer basic questions about their API programs – like how...
Today’s complex computing environments are rife with vulnerabilities. Keeping your organizational data safe requires employing today’s best data security practice: adopting the premise that identity and...
Enterprises are grappling with increased complexity as cloud adoption increases, the perimeter expands, and digital transformation projects take hold. The accelerated shift to remote working has...
The Federal Trade Commission expects some opportunists to attempt to bilk the public when COVID-19 vaccines are made available. The pending, potential federal approval of two...
An effort to establish a public-private collaboration environment was cut from the final bill but a controversial insurance provision was retained. Key lawmakers in the House...
Not long ago, most business was conducted within the confines of office walls, that is, until 2020. This year, work as we know it evolved practically overnight, as employees went home with company...
The Information Security Forum (ISF), trusted source for strategic and practical guidance on information security and risk management, has announced the organization’s outlook for the top global security...
The CERT Coordination Center (CERT/CC) has released information on 33 vulnerabilities, known as AMNESIA:33, affecting multiple embedded open-source Transmission Control Protocol/Internet Protocol (TCP/IP) stacks. A remote attacker could...
The IoT Cybersecurity Improvement Act has been officially signed into law. The bipartisan legislation, sponsored by Reps. Robin Kelly, D-Ill., and Will Hurd, R-Texas, and Sens. Mark Warner,...