As more and more networks are implementing Resource Public Key Infrastructure (RPKI) validation and signing of their BGP routes—to protect themselves against route hijacks and leaks, what should...
Checkout.com, cloud-based global payment solutions provider, announced the hire of J.P. Morgan cybersecurity expert and cloud evangelist Adrian Asher as Chief Information Security Officer (CISO) and head...
Technology continues to transform at an unprecedented rate and the security of that technology is paramount to its users having a trustworthy and positive experience. For...
Software intelligence company Dynatrace announced the findings of an independent global survey of 700 CISOs, which reveals the rising adoption of cloud-native architectures, DevOps, and agile methodologies has broken...
Akamai has offered a deep dive analysis of a recently patched flaw in its Enterprise Application Access (EAA) access control and authentication platform. EAA allows enterprise users to make access...
Server messaging and data exchange platform Apache Pulsar has patched a security bug that could allow an attacker to hijack accounts configured in a specific way....
Despite being over a year into remote working and looking ahead to likely shifts to hybrid remote/in-office working models, four fifths (82%) of businesses still remain...
Microsoft Edge now can automatically switch users to a secure HTTPS connection when visiting websites over HTTP after enabling Automatic HTTPS. This new feature is in...
Threat actors are scanning for sites running the Fancy Product Designer plugin to exploit a zero-day bug allowing them to upload malware. Fancy Product Designer is a...
One high-profile expert raised the ever-looming workforce challenge in suggesting the juice might not yet be worth the squeeze. The National Telecommunications and Information Administration is...