What is HTTP Request Smuggling and HTTP/2 Downgrading?
Have you heard of the term HTTP Request Smuggling? What about HTTP/2 Downgrading? Well, these are vulnerabilities that can be...
Read more →Have you heard of the term HTTP Request Smuggling? What about HTTP/2 Downgrading? Well, these are vulnerabilities that can be...
Read more →Today, API security company Salt Security has announced that it has been accepted to the Amazon Web Services (AWS) Lambda Ready...
Read more →Today, password security pros, Keeper Security have released the key findings from its latest survey about the state of cybersecurity...
Read more →Nick Graham, Chief Technology Officer at information security software business Hicomply discusses the recent surge in interest around artificial intelligence....
Read more →Research commissioned by Cohesity, a leader in AI-powered data security and management, reveals the majority of companies are paying ransoms...
Read more →This week, the National Cyber Resilience Centre Group (NCRCG) – a strategic collaboration between the Home Office, policing, academic and...
Read more →In the contemporary digital era, email remains one of the most predominant forms of business communication. With its unrivalled efficiency...
Read more →According to new research from ISACA, two in every five (41%) privacy professionals in Europe state their budgets are underfunded and...
Read more →For as long as digital systems have exerted control over physical machines and their output, the need, and associated questions...
Read more →Over the last four years, The Most Inspiring Women in Cyber Awards have celebrated some of most inspirational women from...
Read more →Site safety briefings are an essential – and legally necessary – part of the onboarding process for any new starter...
Read more →With Data Privacy Day coming up, we spoke to cybersecurity industry experts about the latest data privacy trends… Allon Mureinik,...
Read more →