Advertisement
More top stories
12 steps to building a top-notch vulnerability management program
Security experts share their best advice for the essential ingredients of a solid vulnerability management program, including foundational elements to put in place, workflows to establish, who to involve, and metrics to track.
The US federal cybersecurity bureaucracy: A guide
A high-level look at the national offices and organizations involved in protecting the US from cyber threats.
Intel bets big on security as a service for confidential computing
At its inaugural Vision event, Intel launched a security as a service initiative called Project Amber for confidential computing in the cloud, and outlined its support for secure and responsible AI and quantum-resistant cryptography....
Advertisement
Five Eyes nations warn MSPs of stepped-up cybersecurity threats
The warning likely comes in response to an increase in attacks on managed service providers, through which threat actors can access their clients.
Top cybersecurity M&A deals for 2022
The hot cybersecurity mergers and acquisition market continues into 2022 as vendors look to solidify their positions and expand their offerings.
A year later, Biden’s cybersecurity executive order driving positive change
Notable experts say the cybersecurity executive order has improved the nation's security posture, but more work is to be done.
Equifax’s Jamil Farshchi: Security shouldn’t be a trade secret
Farshchi joined the credit reporting agency in 2018 with a mandate for change following the company’s high-profile data breach. Today, he’s calling for greater transparency and collaboration in the security community, with Equifax...
Red Hat debuts edge features for Linux, Kubernetes platform security
At its annual Summit event, Red Hat is rolling out new edge-computing features for the company’s well-known enterprise Linux distribution, and security features for its Advanced Cluster Security for Kubernetes platform.
Threat hunters expose novel IceApple attack framework
Suspected state-sponsored threat actor uses IceApple to target technology, academic and government sectors with deceptive software.
ForgeRock offers AI-based solution for identity-based cyberattacks
ForgeRock Autonomous Access is designed to eliminate account takeovers and prevent fraud in real-time, using a combination of AI and advanced pattern recognition.
Advertisement
Stealthy Linux implant BPFdoor compromised organizations globally for years
The China-linked backdoor takes advantage of the Berkeley Packet Filter on Unix systems to hide its presence.
New RAT malware uses sophisticated evasion techniques, leverages COVID-19 messaging
Nerbian RAT malware uses significant anti-analysis and anti-reversing capabilities along with multiple open-source Go libraries to conduct malicious activity.
Progress launches Chef Cloud Security to extend DevSecOps to cloud-native assets
The software provider has also enhanced its underlying security and compliance mechanism Chef InSpec with new features.
What your cyber insurance application form can tell you about ransomware readiness
The annual cyber insurance application form shows what the carriers think you should be doing to best prevent and recover from ransomware attacks. Pay attention.
7 top software supply chain security tools
These tools will help identify vulnerabilities and threats posed by third-party code through software composition analysis and SBOM creation.
From Our Advertisers
-
Featured Sponsor HP Wolf SecurityThe Need for Endpoint Security Rooted In Zero Trust
-
Sponsored by CrowdStrikeThe Top 4 Threats to a Secure Cloud Infrastructure
-
Sponsored by NetscoutDeploy NDR to Modernize Your Cybersecurity Strategy
-
Sponsored by Hillstone NetworksSD-WAN and Cybersecurity: Two Sides of the Same Coin