Lessons From OSC&R on Protecting the Software Supply Chain
A new report from the Open Software Supply Chain Attack Reference (OSC&R) team provides a framework to reduce how much…
A new report from the Open Software Supply Chain Attack Reference (OSC&R) team provides a framework to reduce how much…
Data breaches have accelerated quickly in 2024. Google ‘data breach’ and you’re in for a whirlwind of high-profile names scattered…
In early June, the Ticketmaster breach brought widespread attention to the fact that Snowflake accounts did not require multi-factor authentication…
Cybersecurity compliance is undergoing a massive shift, with regulatory frameworks rapidly introducing more complex rules, stricter enforcement, and tougher penalties…
In the current cybersecurity landscape, the focus has shifted from merely managing vulnerabilities to strategically orchestrating defenses against targeted threats.…
The parents of a 19-year-old Connecticut honors student accused of taking part in a $243 million cryptocurrency heist in August…
CISA warned today of threat actors trying to breach critical infrastructure networks by targeting Internet-exposed industrial devices using "unsophisticated" methods…
In a world where APIs have become integral to the digital and technical experience, they also represent a significant security…
As cloud environments continue to expand, so do the threats targeting them. In today’s fast-paced digital world, attacks on cloud…
The massive Snowflake breach disclosed recently, involving hundreds of millions of stolen customer records, is a stark wake-up call for…