Log4Shell: The Big Picture
A look at why this is such a tricky vulnerability and why the industry response has been good, but not…
A look at why this is such a tricky vulnerability and why the industry response has been good, but not…
As mandatory reporting bills work their way through the halls of Congress, what should businesses do to prepare for this…
Most companies lack the proper tools to assess their vulnerability to threats facing their AI systems and ML pipelines, prompting…
A new bug bounty program aims to find potential security flaws within certain DHS systems and strengthen the department's security…
The early lessons from Log4j indicate that key security principles can help better handle these high-risk software supply chain security…
The U.S. CISA added 13 new vulnerabilities to the Known Exploited Vulnerabilities Catalog, including Apache Log4Shell Log4j and Fortinet […] The…
The Cybersecurity and Infrastructure Security Agency (CISA) warned critical infrastructure organizations today to strengthen their cybersecurity defenses against potential and…
Hybrid work is here to stay, and organizations can apply zero trust's three core principles to ensure a secure workforce,…
North America-based Superior Plus "temporarily disabled" some of its systems in the wake of the attack.
The attack forced a shutdown of computer systems and websites for Virginia legislative agencies and commissions, reports state.