Edgeless Systems Raises $5M to Advance Confidential Computing
Confidential computing will revolutionize cloud security in the decade to come and has become a top C-level priority for industry…
Confidential computing will revolutionize cloud security in the decade to come and has become a top C-level priority for industry…
The Medusa ransomware gang is demanding a $1,000,000 ransom from the Minneapolis Public Schools (MPS) district to delete data allegedly…
The Android app unnecessarily accessed clipboard device contents, which often includes passwords and other sensitive data.
Wazuh is a free, open source security platform that offers Unified XDR and SIEM capabilities. Learn how Wazuh detect and…
An ongoing hacking campaign called 'Hiatus' targets DrayTek Vigor router models 2960 and 3900 to steal data from victims and…
The Federal Trade Commission issued a proposed, $7.8 million settlement order Thursday related to charges that an online counseling service…
The Federal Trade Commission (FTC) has proposed to ban the online counseling service BetterHelp from sharing its customers' sensitive mental…
The Trusted Platform Module (TPM) 2.0 specification is affected by two buffer overflow vulnerabilities that could allow attackers to access…
By Dannie Combs, SVP and Chief Information Security Officer, Donnelley Financial Solutions (DFIN) Don’t let the name fool you: dark…
Digital identity is an extra layer of security needed to protect your organization’s document and workflows. Here’s how it works…