Those who can recall the very earliest days of streaming in the mid-1990s might remember anxiously tapping a finger on their mouse while content buffered. Many...
It’s no secret that, today, the diversity of R&D allows companies to rapidly introduce new applications and push changes to existing ones. But this great complexity...
This is the second part of two articles. Please read the first article here. DevOps has made standardized application architectures obsolete. It’s time to rethink security instead....
The Department of Homeland Security’s Transportation Security Administration (TSA) announced a Security Directive that will enable the Department to better identify, protect against, and respond to...
A web server hosting the domain for a local government in the United States was recently breached by advanced hackers taking advantage of old vulnerabilities in...
Proofpoint, Inc. and Ponemon Institute released the results of a new study on “The Cost of Cloud Compromise and Shadow IT.” The average cost of cloud account compromises reached $6.2...
With the Colonial Pipeline ransomware attacks that caused widespread East Coast fuel shortages still fresh in our minds, new WhiteHat Security research has found that application...
ThycoticCentrify, a provider of cloud identity security solutions formed by the merger of privileged access management (PAM) leaders Thycotic and Centrify, announced new research that reveals more than...
Threat Intelligence has become a bucket for a lot of things – from Indicators of Compromise (IOC), to malware reverse engineering, to deep and dark web...
The Department of Homeland Security (DHS) will issue a directive later this week requiring all pipeline companies to report cybersecurity incidents to federal authorities. The directive comes...
Recent Comments