IT decision makers’ priorities have shifted over the past 12 months and their top areas of focus as they head…
As major cyber incidents involving vendors surge, healthcare entities must carefully and continuously scrutinize the security practices of their third-party…
Hacking can be a dirty word. It evokes images of a person sitting in the dark with a black hoodie…
Microsoft has gone public with an analysis of a mac OS Gatekeeper bug it discovered in July, dubbed Achilles, following…
Cybercrime , Fraud Management & Cybercrime Russians Accused of Aiding Drive to Use Malware to ‘Hack the Taxi Industry’ Mathew…
The past 12 months have been a trying time for cyber security professionals globally. Most notably, they’ve had to contend…
Security researchers have found a new exploit that allows attackers to remotely execute code through Outlook Web Access (OWA), on…
Two critically important security vulnerabilities that Citrix fixed in recent months, still remain vulnerable on thousands of Citrix gateways and…
By Brett Raybould, EMEA Solutions Architect, Menlo Security Malicious payloads are one of the leading challenges facing organizations today. From…
By Dominick Birolin, CISSP, CISA, NSE4 When it comes to finding and keeping the specialists necessary to defend an organization…
Incident & Breach Response , Leadership & Executive Communication , Security Operations Security Director Ian Keller Rants About Bad Coding…
In 2021, Finland set a goal of raising its expenditure on research, development and innovation (RDI) to 4% of GDP…