Why CIOs Should Report to CISOs
If the CISO is responsible for the security of the organization, then that same person also should be responsible for…
If the CISO is responsible for the security of the organization, then that same person also should be responsible for…
Helping management prioritize developer education is a tall order, but it's one the industry must figure out.
2021 is over, and we can look forward to a hopefully healthier, safer, and more normal 2022. However, it was…
Researchers have found half a dozen high-risk vulnerabilities in the latest firmware version for the Netgear Nighthawk R6700v3 router. At…
Severe flaws in Microsoft Exchange and Windows Print Spooler stood out amid a wide range of vulnerabilities security teams were…
Apple has addressed a macOS vulnerability that unsigned and unnotarized script-based apps could exploit to bypass all macOS security protection…
The Department of Homeland Security (DHS) has announced that the 'Hack DHS' program is now also open to bug bounty…
Once the dust settles on Log4j, many IT teams will brush aside the need for the fundamental, not-exciting need for…
NVIDIA has released a security advisory detailing what products are affected by the Log4Shell vulnerability that is currently exploited in…
Security analysts from NCC Group report that ransomware attacks in November 2021 increased over the past month, with double-extortion continuing…