Recently, California passed the California Age-Appropriate Design Code Act (CAADCA), a bill designed to protect children online. Although the bill has presented notable concerns regarding privacy...
IT professionals are becoming increasingly concerned about the growing number of cyber threats and foreign attacks capable of impacting video conferencing. In this Help Net Security video, George...
Compliance standards are designed to give organizations a foundational approach to designing their security program while also reassuring third parties that you have met at least a...
The importance of software threat modeling continues to grow. NIST advises software engineers to adhere to secure software development best practices and do software threat modeling...
Simply put, authentication is the act of proving you are who you say you are. To gain access to protected information, systems or locations, the user...
Every successful attack has breached the security stack. Once the foundation of good cybersecurity, firewalls, and other security products are not enough to block all of the sophisticated...
Emotet, one of the most evasive and destructive malware delivery systems, caused substantial damage during its initial reign. After a coordinated takedown by authorities in early 2021,...
In this Help Net Security video, Tonia Dudley, VP, CISO at Cofense, provides a look at the various changes seen in the phishing threat landscape. Dudley...
As cyber attackers increasingly look to capitalize on accelerating digitalization that has seen many enterprises significantly increase their reliance on cloud-based solutions and services as well...
Bishop Fox collected and analyzed publicly disclosed reports from January to July 2022 to better understand the most frequently reported vulnerability types, the highest-disclosed bounties, and...
Recent Comments