Leaky Cybersecurity Holes Put Water Systems at Risk
At least 97 major water systems in the US have serious cybersecurity vulnerabilities and compliance issues, raising concerns that cyberattacks…
At least 97 major water systems in the US have serious cybersecurity vulnerabilities and compliance issues, raising concerns that cyberattacks…
Secure by Demand offers a starting point for third-party risk management teams, but they need to take the essential step…
MITRE and CISA's 2024 list of the 25 most dangerous software weaknesses exposes the need for organizations to continue to…
Recent backdoor implants and cyber-espionage attacks on their supply chains have African organizations looking to diversify beyond Chinese, American tech…
Bill Gates has more money than most of us can even imagine. If he wanted, he could disappear to some…
The popularity of cryptocurrencies like Ethereum and Bitcoin surged during the pandemic era. What began as a niche, almost novelty…
GitHub projects have been targeted with malicious commits and pull requests, in an attempt to inject backdoors into these projects. Most recently, the…
by Gary S. Miliefsky, CISSP, fmDHS As the publisher of Cyber Defense Magazine, I have a great honor and pleasure…
A new report from the Open Software Supply Chain Attack Reference (OSC&R) team provides a framework to reduce how much…
Despite having only a scant focus on cybersecurity regulations a decade ago, countries in the Middle East — led by…