Organizations are struggling to understand where to start with application security, or even what good looks like. To shed light on how to start an application security program, and what to aim for, this report will outline the steps
U.S. lawmakers plan to introduce legislation to limit the FBI's and other law enforcement use of facial recognition technology after concerns about the mass collection of photographs in police databases.
The FBI is actively investigating Russia's attempts to influence the 2016 U.S. presidential election and possible cooperation from President Donald Trump's campaign, agency director James Comey confirmed.
The latest Enterprise Strategy Group Solution Showcase focuses on the evolution of threat intelligence to Business Risk Intelligence, led by Flashpoint, and examines the current state of the threat intelligence market, the challenges
Companies that use security products to inspect HTTPS traffic might inadvertently make their users' encrypted connections less secure and expose them to man-in-the-middle attacks, the U.S. Computer Emergency Readiness Team warns.
To maximize the benefits of cloud adoption, companies need to migrate to the cloud in a smart way. In this eBook, 10th Magnitude shares the Azure migration success guidelines learned over the course of hundreds of Azure consulting
The record-breaking number of healthcare breaches that occurred in 2016 made millions of stolen healthcare records available for sale on the Deep & Dark Web (DDW). This abundance of stolen data has criminals anticipating significant
A U.S. senator is probing reports of a breach of data from smart toys from Spiral Toys, writing to the company’s CEO a letter with ten questions about the issue, including about the company’s security practices.
A highly effective identity and access management program will always deliver business value. However, treating architecture and security as an afterthought can - and often does - result in massive data breaches that have significant...