
Want to get ahead? Four activities that can enable a more proactive security regime
Hockey legend Wayne Gretzky famously shared his secret to success on the ice: “I skate to […]

Protecting Against Business Email Compromise (BEC): A Comprehensive Guide
Business Email Compromise (BEC) attacks have emerged as one of the most sophisticated and financially devastating […]

What’s next after the CISO role?
Few roles have changed as much as the chief information security officer in the nearly 30 […]

Updating secure boot is crucial to keeping systems secure and working properly
New security features are great, but it’s inevitable that bad actors will eventually find ways around […]

Apache OFBiz patches new critical remote code execution flaw
Developers of Apache OFBiz, an open-source enterprise resource planning (ERP) framework, have released a patch for […]

Two weeks on from Pavel Durov’s arrest, Telegram ramps up moderation of ‘illegal content’
Less than two weeks after Telegram founder and CEO Pavel Durov’s high-profile arrest by French police, […]
Ransomware Attacks Reach Record Highs: Demands and Payments Continue to Soar
As IT complexity continues to rise, businesses are facing an increasingly challenging cybersecurity environment. Ransomware attacks […]

New malicious MS Office macro clusters discovered
CISOs with IT environments running older versions of Microsoft Office must upgrade immediately or risk the […]

Adobe evolves its risk management strategy with homegrown framework
Digital business has transformed virtually everything for enterprises — and it has brought with it cybersecurity […]

US charges 5 Russian spies for Ukraine, NATO cyberattacks
Five officers of the Russian military intelligence service, the GRU, and an alleged civilian collaborator were […]