The Password Isn’t Dead Yet. You Need a Hardware Key
In August, the internet infrastructure company Cloudflare was one of hundreds of targets in a massive criminal phishing spree that succeeded in breaching numerous tech…
In August, the internet infrastructure company Cloudflare was one of hundreds of targets in a massive criminal phishing spree that succeeded in breaching numerous tech…
3rd Party Risk Management , Application Security , Critical Infrastructure Security A Reflection on Top Thought-Leader Interviews of the Year Anna Delaney (annamadeline) • December…
Barry Panayi, chief data and insight officer at John Lewis Partnership (JLP), has a big passion for information. So big, in fact, that he admits…
In a Sydney hotel conference room in May, Tim Hogben, the head of securities and payments for ASX, which runs the Australian stock exchange, told…
The toasts, triumphs, and biggest security wins of the year As 2022 draws to a close, The Daily Swig is revisiting some of the year’s…
Dec 30, 2022Ravie LakshmananBug Bounty / Privacy A security researcher was awarded a bug bounty of $107,500 for identifying security issues in Google Home smart…
The latest edition of the ISMG Security Report shares tips for security leaders to navigate the threat landscape next year, discusses cybersecurity and privacy policy…
For the world of business applications, the shade of Covid-19 faded somewhat in 2022, as the energy crisis, informed by the war in Ukraine, and…
Data from the State Traffic Inspectorate of the Ministry of Internal Affairs of Russia Database has been made available online according to claims by threat…
Systems that interconnect with the government’s My Health Record will need to meet elevated security standards that align with the Essential Eight over the next…
Well, it cannot be termed exactly as an insider threat. But surely, an innocent mistake of an employee could have/might have leaked sensitive details to…
A carefully honed zero trust approach can allow healthcare entities to reduce pushback from clinicians while still “raising barriers appropriately” to prevent security incidents, says…