Imagine if all you needed to do to turn a security policy into an enforced workflow was type it out...
Zoom has joined the CVE Program as a CVE Numbering Authority (CNA). “This is a significant milestone for us as our security program continues to mature here...
Human error contributes to almost 95% of security breaches. Most security approaches still fail at making a desired impact. Let’s analyze the two main reasons why businesses fail...
The Security Executive Council (SEC) has welcomed Tom Bello, Coral Gehring, Matthew Giese, Bill King, and Tom Mahlik to its faculty of esteemed security experts. SEC...
Nonprofit health care provider Scripps Health in San Diego is currently dealing with a ransomware attack that forced the organization to suspend user access to its...
Today, Apple has released security updates that fix two actively exploited iOS zero-day vulnerabilities in the Webkit engine used by hackers to attack iPhones, iPads, iPods,...
A new ransomware gang known as ‘N3TW0RM’ is targeting Israeli companies in a wave of cyberattacks starting last week. Israeli media Haaretz reported that at least...
Cloud service providers hoping to secure authorizations to operate at multiple agencies simultaneously got some more time to make a business case for their prioritization by...
Security researchers are warning that a software supply chain vulnerability impacting PHP could put millions of websites at risk. The flaw, discovered by security researchers at SonarSource, affects...
The National Security Agency (NSA) released the Cybersecurity Advisory, “Stop Malicious Cyber Activity Against Connected Operational Technology” , for National Security System (NSS), Department of Defense...
A multi-billion pound British class action lawsuit has been filed against the tech giant Google in the UK Supreme Court. The lawsuit alleges that Google secretly...
Recent Comments