John P. Mello Jr.

Contributor

John Mello writes on technology and cyber security for a number of online publications and is former managing editor of the Boston Business Journal and Boston Phoenix. Disclosure: He also writes for Hewlett-Packad's marketing website TechBeacon.

Smart factories unprepared for cyberattacks

Smart factories unprepared for cyberattacks

Smart factory operators are well aware of the cyberthreats they face but acknowledge lack of readiness to defend against them.

SQL injection, XSS vulnerabilities continue to plague organizations

SQL injection, XSS vulnerabilities continue to plague organizations

Errors that allow SQL injection and cross-site scripting attacks are still the top vulnerabilities that pen-testers find, especially at smaller companies.

11 top cloud security threats

11 top cloud security threats

More data and applications are moving to the cloud, which creates unique infosecurity challenges. Here are the "Pandemic 11," the top security threats organizations face when using cloud services.

SolarWinds creates new software build system in wake of Sunburst attack

SolarWinds creates new software build system in wake of Sunburst attack

Lessons learned from software supply chain breach lead to innovative and secure development scheme.

Mitek launches MiVIP platform to fight identity theft

Mitek launches MiVIP platform to fight identity theft

The Mitek Verified Identity Platform can leverage multiple authentication technologies to provide security across the transaction lifecycle.

Open-source software risks persist, according to new reports

Open-source software risks persist, according to new reports

Companies are still struggling to gain confidence in the security of their open-source projects, but shifting security earlier in the development process shows promise.

Cloud-native TACACS+ access solution launched by Portnox

Cloud-native TACACS+ access solution launched by Portnox

New product aims to make network authentication, authorization, and accounting technology more attractive to mid-sized companies.

Threat actors becoming more creative exploiting  the human factor

Threat actors becoming more creative exploiting the human factor

Remote work, supply chains, commercial clouds offer threat actors opportunities to trick people into doing their bidding.

ConcealBrowse isolates malicious software before it can work its mischief

ConcealBrowse isolates malicious software before it can work its mischief

Agent-based solution screens code to prevent browser-borne attacks on the enterprise.

How the Colonial Pipeline attack has changed cybersecurity

How the Colonial Pipeline attack has changed cybersecurity

On the one-year anniversary of the Colonial Pipeline attack, industry insiders reflect on the event's effect on cybersecurity practice and perception.

Qualys upgrades vulnerability management solution

Qualys upgrades vulnerability management solution

VMDR 2.0 offers better insight into risk posture, faster fix times for critical vulnerabilities.

Dragos launches info portal to fill security gaps in critical infrastructure

Dragos launches info portal to fill security gaps in critical infrastructure

OT-CERT provides free resources to under-served ICS/OT community members and beefs up threat and vulnerability coordination.

SecureAuth unveils new end-to-end access and authentication solution

SecureAuth unveils new end-to-end access and authentication solution

Orchestration, passwordless tech, continuous authentication combined in next-generation Arculix platform

New Linux-based ransomware targets VMware servers

New Linux-based ransomware targets VMware servers

Cheerscript plants double-extortion malware on ESXi servers.

Enterprises report rise in risk events, yet risk management lags

Enterprises report rise in risk events, yet risk management lags

More threats to data, privacy are the top concerns of risk managers and are becoming “the new normal.”

CISOs worried about material attacks, boardroom backing

CISOs worried about material attacks, boardroom backing

CISOs are also less concerned about ransomware attacks, but many says their organizations are still not properly prepared for them.

Threat hunters expose novel IceApple attack framework

Threat hunters expose novel IceApple attack framework

Suspected state-sponsored threat actor uses IceApple to target technology, academic and government sectors with deceptive software.

Microsoft expands managed security services offerings with new program

Microsoft expands managed security services offerings with new program

Security Experts allows customers to tap into Microsoft pros for threat hunting, XDR, and modernization.

Wrongly configured Google Cloud API potentially creates dangerous functionality

Wrongly configured Google Cloud API potentially creates dangerous functionality

Misconfiguration of the Google Cloud Platform API could create an exploitable behavior that leads to service compromise.

New attack surface management product takes full-stack aim at software supply chain threats

New attack surface management product takes full-stack aim at software supply chain threats

Data Theorem's Supply Chain Secure offers continuous runtime analysis and dynamic inventory discovery.

Load More