New web targets for the discerning hacker As 2022 draws to a close, HackerOne has revealed that cloud-based vulnerabilities became…
In August, the internet infrastructure company Cloudflare was one of hundreds of targets in a massive criminal phishing spree that…
3rd Party Risk Management , Application Security , Critical Infrastructure Security A Reflection on Top Thought-Leader Interviews of the Year…
Barry Panayi, chief data and insight officer at John Lewis Partnership (JLP), has a big passion for information. So big,…
In a Sydney hotel conference room in May, Tim Hogben, the head of securities and payments for ASX, which runs…
The toasts, triumphs, and biggest security wins of the year As 2022 draws to a close, The Daily Swig is…
Dec 30, 2022Ravie LakshmananBug Bounty / Privacy A security researcher was awarded a bug bounty of $107,500 for identifying security…
The latest edition of the ISMG Security Report shares tips for security leaders to navigate the threat landscape next year,…
For the world of business applications, the shade of Covid-19 faded somewhat in 2022, as the energy crisis, informed by…
Data from the State Traffic Inspectorate of the Ministry of Internal Affairs of Russia Database has been made available online…
Systems that interconnect with the government’s My Health Record will need to meet elevated security standards that align with the…
Well, it cannot be termed exactly as an insider threat. But surely, an innocent mistake of an employee could have/might…