As legendary management guru Peter Drucker said, “You can’t manage what you can’t measure.” For some business functions, such as sales and human resources, standard metrics...
Software as a service (SaaS) has taken over, and the average enterprise now uses hundreds of unique SaaS applications to accelerate their digital transformation and business velocity....
One of the main contributors to the weak security posture of development environments is the complexity and knowledge gap created by the number of tools and...
Malcolm Harkins will be joining the Epiphany Systems executive team as Chief Security Officer. With deep cybersecurity domain experience, along with substantial operational understanding on the challenges...
An open source tool that makes grepping the internet for web vulnerabilities simpler, faster, and cheaper was unveiled at Black Hat USA today. Security researchers and bug bounty...
UPDATED A 12-year-old authentication bypass vulnerability that could allow attackers to compromise networks and devices has been discovered in at least 20 router models, potentially affecting millions of users....
Old fashioned data theft is still the main reason adversaries are targeting a popular open-source application management system. U.S. cybersecurity agencies are following up on a...
A security vulnerability in popular dating site OkCupid meant an attacker could dupe users into unknowingly ‘liking’ or sending messages to other profiles. The flaw, which...
A newly fixed bug in the Chromium project allowed malicious parties to inject code in embedded site pages, even if these resources were isolated from the...
A cyberattack has brought down an Italian COVID-19 vaccine-scheduling website. Italian authorities said cybercriminals attacked the technology systems of the Italian region of Lazio. Chuck Everette,...