EC-Council, the global leader in cybersecurity education and training, released its Certified Chief Information Security Officer Hall of Fame Report...
The UK government recently unveiled its new defense, security, and foreign policy strategy. It is billed as the most comprehensive review since the end of the Cold...
A security researcher has been awarded a $55,000 bug bounty after they chained a pair of vulnerabilities in an unnamed third-party application to achieve server-side request forgery (SSRF) and...
UPDATED Satellite operators can no longer ignore cyber risks when designing new satellites or support systems, delegates to the first European event dedicated to satellite cybersecurity heard...
Keypoint: Modifications to the CCPA regulation’s provisions regarding requests to opt-out and authorized agent requests are now final. On March 15, 2021, the California Attorney General’s...
Acer has been hit with a $50 million ransomware demand, according to news reports. This appears to be one of the biggest ransomware demands to date, BleepingComputer reports....
In the current environment, it is wise to incorporate security into your software development lifecycle as early as possible. Historically, security checks were a pre-release gateway...
If you tuned in to watch Tom Brady and that big Sunday football game in early February, chances are you paid attention to the ads as...
Smart threat intelligence starts with good data. In the near future, artificial intelligence-driven cyber operations will play an outsized role in how the federal government protects...
Acting CISA Director Brandon Wales praised the government’s coordination absent a national cyber director. In just about two more months the Cybersecurity and Infrastructure Security Agency...
A US orthopedic practice has admitted that patient healthcare information was inadvertently left on a server that anyone with an internet connection could access. In a data breach notice, Mendelson...
Recent Comments