Security researchers at the Lookout Threat Labs have discovered a new Android malware, dubbed AbstractEmu, with rooting capabilities distributed on Google Play and major third-party stores,...
I had the honor of serving on a Federal Reserve committee this past winter to define synthetic identity fraud. The result of this effort was the...
DevSecOps is (appropriately) emerging as the de facto pattern for managing and deploying applications and managing infrastructure. Security controls, deployments, and virtually all other aspects of enterprise systems...
The National Security Agency (NSA) and the Cybersecurity and Infrastructure Security Agency (CISA) have published the first of a four-part series, Security Guidance for 5G Cloud...
Researchers have helped patch a high-severity-rated security flaw in a popular WordPress plugin, which could be exploited to completely wipe and reset any vulnerable WordPress website....
Netenrich released “Pivoting to Risk-Driven Security Operations,” a global survey of IT and security professionals. The survey found that 83% of companies would suffer business damage...
Supply chain security is going digital, according to Tom Garrison, Vice President and General Manager for Client Security Strategy and Initiatives at Intel. In his Leadership...
The unrelenting pace of cyberattacks shows no signs of abating. Google and Microsoft have pledged billions of dollars to mitigate cyberattacks. The Biden Administration has made...
Nearly all U.S. executives (98%) report that their organizations experienced at least one cyber event in the past year, compared to a slightly lower rate of...
Ransomware is out of control, with some of the most significant ransomware attacks netting ransoms as high as $40 million. Beyond the immediate financial loss, ransomware...
Recent Comments