Why Cyber Teams Should Invest in Strong Communicators
As automation spreads and relieves security pros of time-consuming management tasks, their ability to articulate complex cybersecurity risks with the…
As automation spreads and relieves security pros of time-consuming management tasks, their ability to articulate complex cybersecurity risks with the…
SOC 2 reports are a valuable tool for evaluating vendor security, but they shouldn't be the only piece of the…
Yahoo, Uber, SolarWinds — increasingly, the government is incentivizing better corporate security by punishing the individuals leading it. Is that…
Leveraging Artificial Intelligence to Enhance Cybersecurity Defenses Artificial Intelligence has become essential for safeguarding digital resources in cybersecurity. As organizations…
A threat actor compromised Ethereum's mailing list provider and sent to over 35,000 addresses a phishing email with a link…
Healthcare fintech firm HealthEquity is warning that it suffered a data breach after a partner's account was compromised and used…
Twilio has confirmed that an unsecured API endpoint allowed threat actors to verify the phone numbers of millions of Authy…
Most accomplished cybercriminals go out of their way to separate their real names from their hacker handles. But among certain…
FIA (Fédération Internationale de l'Automobile), the auto racing governing body since the 1950s, says attackers gained access to personal data…
Thousands of pedophiles who download and share child sexual abuse material (CSAM) were identified through information-stealing malware logs leaked on…