The Urgent Need for Data Minimization Standards
A central principle in many data protection laws around the globe is data minimization. But we are currently facing a…
A central principle in many data protection laws around the globe is data minimization. But we are currently facing a…
While a number of threat groups have used TP-Link bugs to infiltrate networks, a proposed ban of the company's popular…
The US Department of Justice has charged a Russian-Israeli dual-national for his suspected role in developing malware and managing the…
Today’s cloud security categories don’t do practitioners any favors when it comes to identifying the key requirements for detection and…
Combating nation-state threat actors at the enterprise level requires more than just cyber readiness and investment — it calls for…
Juniper Networks has warned customers of Mirai malware attacks scanning the Internet for Session Smart routers using default credentials. [...]
Non-human identities authenticate machine-to-machine communication. The big challenge now is to secure their elements and processes — before attackers can…
Cybercriminals are selling hundreds of thousands of credential sets stolen with the help of a cracked version of Acunetix, a…
The draft of the long-awaited update to the NCIRP outlines the efforts, mechanisms, involved parties, and decisions the US government…
Today, it’s rare for a month to pass without reports of new distributed denial-of-service (DDoS) attacks. Lately, geopolitical instability and hacktivist groups…