Threat actors have successfully targeted defense contractors over the years because they haven’t fully secured their networks, thus creating serious vulnerabilities in U.S. national security. To...
Cybersecurity has continually increased in priority and spending in recent years. Industry insights show that the federal government had to pay more than 13.7 billion dollars to counter...
New Tessian report reveals that cybersecurity jobs weathered Covid-19 storm and explains why industry needs to address issue with equal pay to encourage more women to...
Under pressure to support a newly distributed workforce, organizations are rapidly migrating to the cloud. While this may be viewed as a leap forward for business, it...
The 2021 edition of the Electronic Security Expo (ESX), an annual education and networking event dedicated to professionals from the electronic security and life safety industry,...
The use of artificial intelligence (AI) in cybersecurity, while often overhyped, is not a new concept. Hackers have included countermeasures in malware since its inception to...
There has been a misconception about privacy that confuses many people. People tend to share seemingly related or unrelated personal information online, such as birthdays, address,...
The National Security Agency and Cybersecurity and Infrastructure Security Agency (CISA) released a cybersecurity information sheet, “Selecting a Protective DNS Service.” This publication details the benefits...
Malaysia Airlines has confirmed it has suffered a “data security incident” via a third-party IT service provider. The company also said the breach had not affected...
Synopsys Cybersecurity Research Center (CyRC) researchers have discovered CVE-2020-27223, a denial of service vulnerability in Eclipse Jetty, a widely used open source web server and servlet container. According...
Recent Comments