While researching a misconfiguration in the popular workflow platform Apache Airflow, Intezer discovered several unprotected instances. These unsecured instances expose companies’ sensitive information across the media,...
Arizona’s new Cyber Command Center opened recently at ceremony in the Department of Public Safety’s Arizona Counter Terrorism Information Center (ACTIC) in Phoenix. The Cyber Command...
Researchers at the University of Missouri College of Engineering recently received a two-year, approximately $500,000 cybersecurity research grant from the National Security Agency (NSA) to develop...
Unchecked data growth and disorganization increases cyber risk, according to Egnyte’s 2021 Data Governance Trends Report. The report is based on a survey of 400 IT...
Microsoft Active Directory (AD) is used by over 90% of the Fortune 1000 for identity and access management. It’s also a prime target for hackers. With...
As travel aviation begins to bounce back after the initial COVID-19 shutdown, the Flight Safety Foundation (FSF) is calling on the aviation industry, regulators and health...
Officials say there’s a lot agencies and other entities should be doing, even though it may be more than a decade before a quantum computer can...
The commission’s new rule on foreign ownership and investment comes amid an industry call for international alignment on the use of voluntary standards to secure the...
Under a proposed rule, voice service providers would cross reference autodialed calls with numbers on the do not call list to block any robocalls to emergency...
The rediscovery of vulnerabilities in wireless chip firmware technology from Broadcom has revealed how inherited security flaws can get baked into networking technology. Security researchers at IoT Inspector...