A startling statistic is rippling through the media: over an eight-year period, reports confirmed that the number of unfilled cybersecurity jobs grew over 350%, from 1 million...
While authentication and authorization might sound similar, they are two distinct security processes in the identity and access management (IAM) space. Authentication is the security practice...
Domino’s India has disclosed a data breach after a threat actor hacked their systems and sold their stolen data on a hacking forum. In April 2021,...
An Iranian hacking group has been observed camouflaging destructive attacks against Israeli targets as ransomware attacks while maintaining access to victims’ networks for months in what...
A Homeland Security Department procurement official said securing and fielding advanced technologies is “not going to get any easier.” Federal agencies are getting better at buying...
Cybersecurity professionals stress the importance of proactive defense to combat the growing number of attacks. The scourge of ransomware will proceed with or without closer regulation...
The most significant single obstacle to progress in cybersecurity is not the technical challenge or even the workforce/skills gap. In 2011, the Department of Homeland Security...
A Russian citizen has been jailed for 30 months for his role in selling stolen credit card information and other data used to fuel further criminal activity. Kirill...
Rehoboth McKinley Christian Health Care Services (RMCHCS), a non-profit healthcare provider operating in Arizona and New Mexico, has reported a data breach impacting around 200,000 patients and employees....
UPDATED Security researchers have detailed how a series of moderate severity vulnerabilities in IT monitoring technology Nagios could be chained together to attack organizations on a grand scale. Researchers...