With more individuals working remotely over the past two years, the world has seen a rise in collaborative technologies, with meetings taking place via Zoom, Microsoft...
The tech can provide evidence of compliance with configuration standards and detect anomalies in complex multi-tenant, multi-cloud computing architectures. Cloud service providers and mobile operating networks...
Cyber policy lead Mieke Eoyang discussed the Defense Department’s role in the nation’s cybersecurity posture, including in defending elections and countering ransomware attacks. Those who believe...
Agencies have struggled to hire IT and cyber professionals but some are finding alternative ways to fill the talent gap. For decades, federal agencies have struggled...
Cross-site leaks (XS-Leak) are a family of browser-side channels that can be used to infer information about users. Web developers and browser vendors often misunderstand XS-Leak...
The personal data more than 1.2 million GoDaddy customers was exposed after cybercriminals breached its WordPress hosting service, the company has admitted. In a statement filed with the US Securities...
A large-scale malware campaign on Huawei’s AppGallery has led to approximately 9,300,000 installs of Android trojans masquerading as over 190 different apps. The trojan is detected...
An advanced hacking group known as ‘Tardigrade’ is targeting biomanufacturing facilities and research centers working on vaccines and critical medicines. The actor uses sophisticated custom malware...
IEEE released the results of “The Impact of Technology in 2022 and Beyond: an IEEE Global Study,” a new survey of global technology leaders from the U.S.,...
Taking a marketing campaign approach with internal security communication efforts Data security is top-of-mind for businesses of all kinds as reports of data breaches hit the...