Top Benefits of Implementing a Cloud HSM for Enterprise Security
As enterprises continue to navigate the complexities of safeguarding sensitive data, the need for robust encryption […]
Why are we still confused about cloud security?
A report by cloud security company Tenable discovered that 74% of companies surveyed had exposed storage or other […]
Alleged Cisco data breach could affect Microsoft, Barclays, and SAP developer data
Notorious hacker “IntelBroker” is offering to sell a large amount of sensitive data from Cisco allegedly […]
Governments fear election interference, but it’s an enterprise cybersecurity problem too
Election security is a topic that percolates to the forefront every couple of years, especially as […]
Authorities warn of global cyber campaign by Russian intelligence
The British cyber security agency National Cyber Security Center (NCSC) warns that the Russian foreign intelligence service, Sluzhba […]
Chinese researchers break RSA encryption with a quantum computer
In a potentially alarming development for global cybersecurity, Chinese researchers have unveiled a method using D-Wave’s […]
Open source package entry points could be used for command jacking
Open source application packages, including those in Python and JavaScript, have a vulnerability in their entry […]
Iranian hackers use Windows holes to attack critical Gulf and Emirates systems
An Iran-linked cyber-espionage group has been, in recent months, conducting cyberattacks in the United Arab Emirates […]
What’s next for the CISO role?
As executive vice president and CISO, Jerry Geisler is a top-level executive at Walmart. That rank, […]
Malicious open-source software packages have exploded in 2024
Malware is infiltrating the open-source software development ecosystem at an alarming rate, according to a new […]