A handful of malware samples that emerged in 2021 demonstrated once again that Apple’s technologies, while less prone to attack and compromise than Windows systems, are not...
There are real security concerns that should be addressed ahead of further government adoption of a truly automated future. Much as a character in the 1960s...
From HAFNIUM’s attack on Microsoft Exchange servers to the Colonial Pipeline ransomware attack that disrupted fuel deliveries, 2021 witnessed an increasing number and variety of cyber threats. Coupled with the...
Insider risk can’t be overlooked. For almost a year, Navy engineer Jonathan Toebbe and his wife Diana sold information known as restricted data concerning the design...
Log4Shell is the latest hacker exploit rocking the internet, and it’s arguably the worst yet. The vulnerability is in an obscure piece of software used on...
Organizations usually manage the security of data, applications and edge computing from disparate technologies and across different teams. That traditional approach will not work going forward because your...
Venafi announced the findings of a global survey of more than 1,500 IT security decision makers that reveals that 60% of security professionals believe ransomware threats should be...
Officials must weigh the benefits and risks on a case-by-case basis. For decades, cyberattacks, counterterrorism events and acts of espionage happened in secret—and stayed there. Even when...
The Cybersecurity and Infrastructure Security Agency order comes as a prominent firm says nation states are exploiting the vulnerabilities. Federal agencies have until 5 pm on...
The agencies got specific about who is responsible for what in a four-part series on securing the inherently cloud-based environments. Federal cybersecurity agencies addressed original equipment...
Recent Comments