The hack highlights jurisdictional issues on pipeline cybersecurity. The White House has formed an interagency task force in response to a cyberattack on Colonial Pipeline Company...
With the network border blurry at best, we no longer have a single and convenient point of telemetry collection to force the attacker in the open....
The adversary is changing its tools to avoid detection while attacking the vulnerabilities governments issue warnings about. The Russian hacker group behind the historic SolarWinds intrusion...
Having succeeded in passing a number of their recommendations through the last National Defense Authorization Act, the commissioners plan to embrace an oversight role as they...
Air Force Chief Software Officer Nicolas Chaillan and industry experts explain how Platform One is eliminating barriers to entry for DevSecOps teams. Pockets of software expertise...
Human error contributes to almost 95% of security breaches. Most security approaches still fail at making a desired impact. Let’s analyze the two main reasons why businesses fail...
Cloud service providers hoping to secure authorizations to operate at multiple agencies simultaneously got some more time to make a business case for their prioritization by...
Babuk ransomware gang, which was discovered at the beginning of 2021, is known to target multiple sectors such as healthcare, manufacturing, and logistics. It has been...
Zero-day vulnerabilities are among the deadliest threats leveraged by attackers to accomplish their malicious attacks. Everyone is aware of the damage caused by the recent ProxyLogon zero-day attacks....
The North Korea-based threat actor Lazarus had targeted e-commerce shops in 2019 and 2020 to steal payment card information. In those attacks, the attackers were experimenting...