John P. Mello Jr.

Contributor

John Mello writes on technology and cyber security for a number of online publications and is former managing editor of the Boston Business Journal and Boston Phoenix. Disclosure: He also writes for Hewlett-Packad's marketing website TechBeacon.

Attacks using Office macros decline in wake of Microsoft action

Cybercrime escalates as barriers to entry crumble

Cybercrime escalates as barriers to entry crumble

New report by HP Wolf Security focuses on current and future malicious activity trends in the cybercrime underground.

Deloitte expands its managed XDR platform

Deloitte expands its managed XDR platform

New additions beef up intelligence gathering, threat hunting, and mobile device security.

Orca adds detection and response capabilities to its agentless cloud security solution

Orca adds detection and response capabilities to its agentless cloud security solution

New feature gives users full visibility into cloud environments to thwart workload and non-workload attacks.

Passwordless company claims to offer better password security solution

Passwordless company claims to offer better password security solution

Stytch's business is getting rid of passwords so why is it trying to "modernize" their use?

New Flashpoint offering automates incident response workflows

New Flashpoint offering automates incident response workflows

Low-code platform enables security teams to build security workflows with drop-and-drag ease.

Feds wave red flag over Maui ransomware

Feds wave red flag over Maui ransomware

Malware with manual twist and North Korean connection poses threat to healthcare providers.

Splashtop teams with Acronis for remote security support

Splashtop teams with Acronis for remote security support

Scalable offering claims to allow security-focused technicians to troubleshoot problems without leaving Acronis console.

Smart factories unprepared for cyberattacks

Smart factories unprepared for cyberattacks

Smart factory operators are well aware of the cyberthreats they face but acknowledge lack of readiness to defend against them.

SQL injection, XSS vulnerabilities continue to plague organizations

SQL injection, XSS vulnerabilities continue to plague organizations

Errors that allow SQL injection and cross-site scripting attacks are still the top vulnerabilities that pen-testers find, especially at smaller companies.

11 top cloud security threats

11 top cloud security threats

More data and applications are moving to the cloud, which creates unique infosecurity challenges. Here are the "Pandemic 11," the top security threats organizations face when using cloud services.

SolarWinds creates new software build system in wake of Sunburst attack

SolarWinds creates new software build system in wake of Sunburst attack

Lessons learned from software supply chain breach lead to innovative and secure development scheme.

Load More