Business Operations | News, how-tos, features, reviews, and videos
Budgetary and staffing issues are putting pressure on CISOs and other security leaders. Here are 10 tasks that typically bog cyber teams down and what some security chiefs did to solve the problems.
Aqua Security says PowerShell issue can allow attacks involving registration of malicious packages with names similar to existing popular package names when developers make mistakes.
Disclosure occurred within Freedom of Information (FOI) responses issued by law enforcement agencies.
Israeli cybersecurity startup Orca has accused Wiz of taking its “revolutionary inventions” and creating a “copycat cloud security” platform.
This newly discovered "dual use" campaign enables software supply chain compromise as well as phishing.
Insight into how the human mind works can help combat the evils of social engineering, boosting the fight against phishing and other mind-manipulation techniques.
US SEC staff have recommended legal action against individual SolarWinds employees, including the CISO — an unusual move that is causing a stir among cybersecurity professionals.
Threat actors are concealing campaigns to evade detection and establish stronger footholds in compromised systems.
The application programming interface (API) has become integral to setting up functionality and flexibility. But they’re also potential attack vectors that need to be high on the security team’s radar.
Software supply chain security vendor claims to have discovered that true, non-agent-based runtime vulnerability analysis is possible by harnessing cloud APIs.