Protecting Your SaaS Applications – A Security Guide
An All-encompassing Approach to Prevent Breaches Organizations depend deeply on technology and data to run their businesses. The recent transition…
An All-encompassing Approach to Prevent Breaches Organizations depend deeply on technology and data to run their businesses. The recent transition…
D-Link is warning that four remote code execution (RCE) flaws impacting all hardware and firmware versions of its DIR-846W router…
Safeguarding your enterprise’s data operations is more critical than ever. The rise of malicious bot attacks poses a particular threat,…
Oil and gas giant Halliburton has confirmed in a filing today to the Securities and Exchange Commission (SEC) that data…
Transport for London (TfL), the city's transport authority, is investigating an ongoing cyberattack that has yet to impact its services.…
Revolutionizing Network Security Automation I recently spoke with Rekha Shenoy, CEO of BackBox during the BlackHat conference, and her insights…
Pioneering Pentest as a Service (PtaaS) for Enhanced Offensive Security At BlackHat, we had the opportunity to speak with Jason…
Successful ransomware attacks against organizations in Asia continue at peak levels in 2024 following a wave of high-profile data breaches…
The popular Docker-OSX project has been removed from Docker Hub after Apple filed a DMCA (Digital Millennium Copyright Act) takedown…
Cisco's deal to acquire Robust Intelligence will make it possible to use red-team algorithms to assess risk in AI models…