Advertisement
More top stories
Mitek launches MiVIP platform to fight identity theft
The Mitek Verified Identity Platform can leverage multiple authentication technologies to provide security across the transaction lifecycle.
Italian spyware firm is hacking into iOS and Android devices, Google says
RCS Lab spyware uses known exploits to install harmful payloads and steal private user data, according to a Google report.
5 social engineering assumptions that are wrong
Cybercriminals continue to launch creative social engineering attacks to trick users. Meanwhile, social engineering misconceptions are exacerbating the risks of falling victim.
Advertisement
Security startups to watch for 2022
Security startups are often innovation leaders. These are some of the most interesting ones to watch as they tackle issues around cloud security, asset management and more.
Open-source software risks persist, according to new reports
Companies are still struggling to gain confidence in the security of their open-source projects, but shifting security earlier in the development process shows promise.
Kaseya closes $6.2 billion Datto deal, vows to cut prices
The IT services software provider promises lower costs for consumers, tight integration between the two companies’ products.
Cisco reports vulnerabilities in products including email and web manager
New vulnerabilities found in Cisco internal testing allow remote access and scripting that could lead to the loss of sensitive user data.
Palo Alto adds out-of-band web application security features to Prisma Cloud
Vendor says new updates will help organizations better monitor and secure web applications without impacting performance.
U.S. data privacy and security solutions emerging at the federal level
The American Data Privacy and Protection Act bill faces a tough battle for passage, but the Biden administration is considering actions of its own.
MITRE's Inside-R Protect goes deep into the behavior side of insider threats
The new Inside-R program looks to collect historical insider threat data to more deeply analyze behaviors that signal risk.
Advertisement
Dozens of insecure-by-design flaws found in OT products
The OT:ICEFALL report shows that makers of operational technology manufacturers have to improve the security of their devices.
Microsoft includes IoT devices under its Secured-core program
The Edge Secured-core, program is designed to validate IoT devices for specific security hardware technology, and ensure users that they are running an OS with built-in security technology.
How the Secure Software Factory Reference Architecture protects the software supply chain
This breakdown of the Cloud Native Computing Foundation's secure software factory guidance focuses on software provenance and build activities.
How Microsoft Purview can help with ransomware regulatory compliance
Microsoft's renamed compliance portal provides guidance and rule-setting capability to help comply with ransomware and other security and privacy requirements.
Defending quantum-based data with quantum-level security: a UK trial looks to the future
Telecommunications giant BT is testing secure quantum data transmission over a network in what could be a glimpse into the shape of things to come for cybersecurity in a quantum computing world
From Our Advertisers
-
Featured Sponsor HP Wolf SecurityThe Need for Endpoint Security Rooted In Zero Trust
-
Sponsored by FortinetMajor Retailer Converges Network and Security Systems With Fortinet Secure
-
Sponsored by Microsoft SecurityWhat Every Enterprise Can Learn from Russia’s Cyber Assault on Ukraine
-
Sponsored by CrowdStrikeSo You Want To Defend Your Cloud… Agentless or Agent-based, Which Approach Is