Improving Software Security in 2022
The recent Log4j vulnerability showed just how quickly a security bug could disrupt not just an industry, but the entire
Read moreThe recent Log4j vulnerability showed just how quickly a security bug could disrupt not just an industry, but the entire
Read moreUS cybersecurity and intelligence company Resecurity Inc announces its partnership with ML Consulting to add Artificial Intelligence (AI)-driven cybersecurity services
Read moreAside from stolen data and money, perhaps the greatest impact of massive attacks like SolarWinds, Colonial Pipeline, and the current
Read moreStakeholders in the tech industry ranging from hyperscalers to open-source developers attended a White House cybersecurity meeting last week. There
Read moreWhile SAP, one of the world’s leading producers of software for the management of business processes, takes an approach to
Read moreThere are so many aspects to cybersecurity; which are the most important? Which are most useful to me and how
Read moreNearly 400,000 servers belonging to 1,500 companies around the world are exposed and discoverable over the internet — meaning anyone
Read moreReading multiple reviews and analysis on recent ransomware attacks, especially the most famous one on Colonial Pipeline which paid a
Read moreEndpoint protection can be a double-edged sword. That is because overloading endpoints with too many clients, not keeping OS patches
Read moreBarika L Pace, senior director research analyst at Gartner, discusses what security and risk leaders need to know about avoiding
Read moreAt this year’s International Conference on Learning Representations (ICLR), a team of researchers from the University of Maryland presented an
Read moreNeil Thacker, EMEA CISO at Netskope, talked about the benefits and challenges that can come with network and security transformation
Read moreTypical hybrid cloud IT integration strategies have fundamental design flaws that CIOs and CISOs need to address if they’re going
Read more