Driving Security Forward: How Automakers Can Stay Ahead of Cyber Threats and Compliance Challenge
As technology revolutionizes the way OEMs build cars, this software-powered shift has also introduced new risks and challenges. As cars…
As technology revolutionizes the way OEMs build cars, this software-powered shift has also introduced new risks and challenges. As cars…
As organizations on the continent expand their use of digital technologies, they increasingly face many of the same threats that…
The number of DDoS-related incidents targeting APIs have jumped by 30x compared with traditional Web assets, suggesting that attackers see…
Almost every single Fortune 500 company continues to maintain some form of DEI commitment, a new report shows, even though…
There are two main reasons why supply chain attacks are on the increase. First, there is a general trend of…
Having evolved from a basic premise of locking down a victim’s data with encryption, then demanding a ransom for its…
Secure by Demand offers a starting point for third-party risk management teams, but they need to take the essential step…
MITRE and CISA's 2024 list of the 25 most dangerous software weaknesses exposes the need for organizations to continue to…
Recent backdoor implants and cyber-espionage attacks on their supply chains have African organizations looking to diversify beyond Chinese, American tech…
by Gary S. Miliefsky, CISSP, fmDHS As the publisher of Cyber Defense Magazine, I have a great honor and pleasure…