Immature equals insecure: why cybersecurity maturity testing is a must
[By Phil Robinson, Principal Security Consultant, Prism Infosec] Cyber maturity is all about ensuring the organisation is prepared for a cyber attack and that can…
[By Phil Robinson, Principal Security Consultant, Prism Infosec] Cyber maturity is all about ensuring the organisation is prepared for a cyber attack and that can…
Letting go is hard. Today we say goodbye to the original 18 vulnerability types on HackerOne. They’ve been with us since the very beginning. Fortunately, we…
McDonald’s has blamed a third-party service provider’s configuration change, not a cyberattack, for the global outage that forced many of its fast-food restaurants to close.…
By Eddy Zervigon, CEO of Quantum Xchange Cryptography has long been essential in ensuring the protection of data and communication networks. However, even as we…
By Mike Wiseman, Vice President, Public Sector, Pure Storage In fiscal year 2022, the federal government spent a total of $12.3 billion on cloud goods…
[By Venky Raju, Field CTO, ColorTokens] In today’s highly digitalized and collaborative business environment, the likelihood of a cybersecurity breach is a matter of when,…
The International Monetary Fund (IMF) is investigating a cyber incident, which was detected on February 16, adding that the 11 email accounts involved had been…
Moldovan citizen sentenced in connection with the E-Root cybercrime marketplace case Pierluigi Paganini March 15, 2024 US DoJ sentenced a Moldovan national (31) to 42…
The International Monetary Fund (IMF) disclosed a cyber incident on Friday after unknown attackers breached 11 IMF email accounts earlier this year. This international financial…
Organised by Eskenzi PR in media partnership with the IT Security Guru, the Most Inspiring Women in Cyber Awards aim to shed light on the remarkable women in…
Following the February 21 attack on Change Healthcare, scores of people in the US have been living with the brutal, real-world effects of ransomware. Described…
Mar 15, 2024NewsroomHardware Security / Data Protection A group of researchers has discovered a new data leakage attack impacting modern CPU architectures supporting speculative execution.…