
What’s next after the CISO role?
Few roles have changed as much as the chief information security officer in the nearly 30 […]

Updating secure boot is crucial to keeping systems secure and working properly
New security features are great, but it’s inevitable that bad actors will eventually find ways around […]

Apache OFBiz patches new critical remote code execution flaw
Developers of Apache OFBiz, an open-source enterprise resource planning (ERP) framework, have released a patch for […]

Two weeks on from Pavel Durov’s arrest, Telegram ramps up moderation of ‘illegal content’
Less than two weeks after Telegram founder and CEO Pavel Durov’s high-profile arrest by French police, […]
Ransomware Attacks Reach Record Highs: Demands and Payments Continue to Soar
As IT complexity continues to rise, businesses are facing an increasingly challenging cybersecurity environment. Ransomware attacks […]

New malicious MS Office macro clusters discovered
CISOs with IT environments running older versions of Microsoft Office must upgrade immediately or risk the […]

Adobe evolves its risk management strategy with homegrown framework
Digital business has transformed virtually everything for enterprises — and it has brought with it cybersecurity […]

US charges 5 Russian spies for Ukraine, NATO cyberattacks
Five officers of the Russian military intelligence service, the GRU, and an alleged civilian collaborator were […]

Boost security and control at every stage of the cloud application lifecycle
It’s no secret that cloud security is a complex undertaking. Today’s threat actors have grown increasingly […]

GitHub Actions typosquatting: A high-impact supply chain attack-in-waiting
Attackers have long tried to capitalize on typos by registering names in various systems — DNS, […]