The Urgent Need for Data Minimization Standards
A central principle in many data protection laws around the globe is data minimization. But we are currently facing a…
A central principle in many data protection laws around the globe is data minimization. But we are currently facing a…
Google is using artificial intelligence to power a new Chrome scam protection feature that analyzes brands and the intent of pages…
Combating nation-state threat actors at the enterprise level requires more than just cyber readiness and investment — it calls for…
Fortinet has patched CVE-2023-34990 in its Wireless LAN Manager (FortiWLM), which combined with CVE-2023-48782 could allow for unauthenticated remote code…
A newly discovered vulnerability, CVE-2024-53677, in the aging Apache framework is going to cause major headaches for IT teams, since…
Non-human identities authenticate machine-to-machine communication. The big challenge now is to secure their elements and processes — before attackers can…
Cybercriminals are selling hundreds of thousands of credential sets stolen with the help of a cracked version of Acunetix, a…
The number of DDoS-related incidents targeting APIs have jumped by 30x compared with traditional Web assets, suggesting that attackers see…
by Dan K. Anderson CEO, CISO, and vCISO As cyber threats grow more sophisticated and frequent, organizations face immense pressure…
Artificial intelligence capabilities are coming to a desktop near you — with Microsoft 365 Copilot, Google Gemini with Project Jarvis,…