Fox News Politics Republican Walz abortion record is ‘on par with China and North Korea,’ says parental rights advocate Aug 31, 2024 foxnews.com Renee Carlson, a family rights advocate in Minneapolis, told Fox News Digital that Minnesota Gov. Walz's record on religion and…
Technology Researchers find SQL injection to bypass airport TSA security checks Aug 30, 2024 bleepingcomputer.com Security researchers have found a vulnerability in a key air transport security system that allowed unauthorized individuals to potentially bypass…
Cyber Security Making Progress and Losing Ground Aug 30, 2024 cyberdefensemagazine.com As an industry and a society, we are finally making progress in protecting both our digital and physical identities. The…
Cyber Security Why Identity Teams Need to Start Reporting to the CISO Aug 30, 2024 darkreading.com Identity management sits with IT for good reason, but now that identity is the common denominator in every attack, it's…
Cyber Security Top Travel Sites Have Some First-Class Security Issues to Clean Up Aug 29, 2024 darkreading.com Public-facing vulnerabilities, cloud sprawl, access to back-end servers are just a few of the challenges travel and hospitality companies must…
Cyber Security Innovator Spotlight: ThreatLocker Aug 29, 2024 cyberdefensemagazine.com In the rapidly evolving world of cybersecurity, incidents frequently arise when malicious code finds its way into trusted environments. These…
Cyber Security Innovator Spotlight: Beyond Identity Aug 29, 2024 cyberdefensemagazine.com At Black Hat 2024, I had the opportunity to speak with Jasson Casey, CEO of Beyond Identity, about their groundbreaking…
Cyber Security The End of the Tunnel Vision: Why Companies Are Ditching VPNs for Zero Trust Aug 28, 2024 cyberdefensemagazine.com Virtual private networks (VPNs) have been the workhorse of secure remote access for decades. They offer a seemingly simple solution:…
Cyber Security Encryption of Data at Rest: The Cybersecurity Last Line of Defense Aug 27, 2024 cyberdefensemagazine.com Defending business against cyberattack Encryption of Data at Rest: The Cybersecurity Last Line of Defense In the ever-evolving landscape of…
Cyber Security Cybercriminals Tap Greasy Opal to Create 750M Fake Microsoft Accounts Aug 26, 2024 darkreading.com Such cyberattack enablement services let attackers breach security measures, establish new fake accounts, and brute-force servers.
Walz abortion record is ‘on par with China and North Korea,’ says parental rights advocate
Renee Carlson, a family rights advocate in Minneapolis, told Fox News Digital that Minnesota Gov. Walz's record on religion and…
Researchers find SQL injection to bypass airport TSA security checks
Security researchers have found a vulnerability in a key air transport security system that allowed unauthorized individuals to potentially bypass…
Making Progress and Losing Ground
As an industry and a society, we are finally making progress in protecting both our digital and physical identities. The…
Why Identity Teams Need to Start Reporting to the CISO
Identity management sits with IT for good reason, but now that identity is the common denominator in every attack, it's…
Top Travel Sites Have Some First-Class Security Issues to Clean Up
Public-facing vulnerabilities, cloud sprawl, access to back-end servers are just a few of the challenges travel and hospitality companies must…
Innovator Spotlight: ThreatLocker
In the rapidly evolving world of cybersecurity, incidents frequently arise when malicious code finds its way into trusted environments. These…
Innovator Spotlight: Beyond Identity
At Black Hat 2024, I had the opportunity to speak with Jasson Casey, CEO of Beyond Identity, about their groundbreaking…
The End of the Tunnel Vision: Why Companies Are Ditching VPNs for Zero Trust
Virtual private networks (VPNs) have been the workhorse of secure remote access for decades. They offer a seemingly simple solution:…
Encryption of Data at Rest: The Cybersecurity Last Line of Defense
Defending business against cyberattack Encryption of Data at Rest: The Cybersecurity Last Line of Defense In the ever-evolving landscape of…
Cybercriminals Tap Greasy Opal to Create 750M Fake Microsoft Accounts
Such cyberattack enablement services let attackers breach security measures, establish new fake accounts, and brute-force servers.