 
																		Do boards understand their new role in cybersecurity?
Julie Ragland was CIO of vehicle manufacturing company Navistar, and has held IT leadership roles at […]
 
																		How cybersecurity red teams can boost backup protections
Cybersecurity red teams are known for taking a more adversarial approach to security by pretending to […]
 
																		SpyCloud Unveils Massive Scale of Identity Exposure Due to Infostealers, Highlighting Need for Advanced Cybersecurity Measures
Research indicates that an infostealer malware infection is often a precursor to a ransomware attack SpyCloud, […]
 
																		Australian cops bust underworld app through compromised software updates
Australia’s Federal Police (AFB) said it hacked into a dedicated encrypted communication platform, Ghost, to dismantle […]
 
																		Personhood: Cybersecurity’s next great authentication battle as AI improves
CISOs may be intimately familiar with the dozens of forms of authentication for privileged areas of […]
 
																		Cybersecurity vet Madison Horn makes her bid for US Congress
It’s safe to say that Madison Horn is the only candidate for US Congress in history […]
 
																		Microsoft fixes Authenticator design flaw after eight years overwriting accounts
Having ignored user complaints about a security design flaw within Microsoft Authenticator for eight years, Microsoft […]
 
																		Warning to ServiceNow admins: Block publicly available KB articles
Many organizations using ServiceNow are inadvertently exposing sensitive personal and corporate data through misconfigured Knowledge Base […]
 
																		Navigating the future of OT security
Operational technology (OT) infrastructure is facing an unprecedented wave of cyberattacks, with a reported 73% surge […]
 
																		Microsoft re-categorizes fixed Trident bug as zero day
A recently patched Windows MSHTML (Trident) Platform Spoofing Vulnerability had zero day exploitations since before July […]
