Innovator Spotlight: Gurucul
It was a privilege to meet with Saryu Nayyar, CEO of Gurucul, a prominent woman leader in the cybersecurity industry.…
It was a privilege to meet with Saryu Nayyar, CEO of Gurucul, a prominent woman leader in the cybersecurity industry.…
Virtual private networks (VPNs) have been the workhorse of secure remote access for decades. They offer a seemingly simple solution:…
As manufacturing advances into the Industry 4.0 era, the integration of Information Technology (IT) and Operational Technology (OT) necessitates a…
The Cannon Corporation dba CannonDesign is sending notices of a data breach to more than 13,000 of its clients, informing that hackers…
The concept of “defense in depth” dates back to ancient times, epitomized by the ramparts, draw-bridge, towers, and battlements surrounding…
Privilege escalation flaws in the healthcare chatbot platform could have allowed unauthorized cross-tenant access and management of other customers’ resources.
When I go to BlackHat I’m always looking for cyber innovation across many vectors including cyber resilience artificial intelligence and…
It is firmly established that there is no such thing as 100% security – in fact, a security breach is not a…
The AI boom and increasing popularity of quantum computing necessitates quantum-resilient security.
Introduction Operational Technology (OT) devices, integral in controlling and monitoring industrial processes, have become prime targets for cyberattacks. Since late…