Industry | News, how-tos, features, reviews, and videos
As with other products, Microsoft will likely offer some extended security updates even after the end-of-life date in October 2025, but there are many risks to be considered.
While the UN, the EU, and the US and its individual states all push to place limits and restrictions on AI, what’s emerging is a patchwork quilt that security leaders need to stay on top of.
International sanctions, IT isolation, and shifting attitudes to ethical hacking have bug bounty programs on the rise in Russia, with zero-day acquisition companies potentially poised to profit.
A disparity in how some big insurance cases are handled can muddy the takeaways for CISOs gauging their own insurance needs.
SEC risk management and disclosure rules can be overwhelming and fraught with difficulties. Steve Durbin, chief executive of the Information Security Forum, offers advice for coping with the hassles.
With so many software agents in today’s IT ecosystems, epic fails like CrowdStrike’s are an inevitability. Make sure your teams are prepared by investing in preparation and rethinking dependencies.
CrowdStrike, Windows domain administration, SolarWinds — our implicit trust in admin software is a recipe for repeated disasters.
At this year’s cybercrime-oriented conference Sleuthcon, Morocco emerged as a locus of cybercrime, while UK and US law enforcement highlighted how creative they've become in shaming and disrupting criminal groups.
China is targeting dissidents and others abroad to help in campaigns to steal government and corporate data. There is no organization, large or small, that is immune from the threat.
The dark web is part of the internet that isn't visible to search engines and requires the use of an anonymizing browser called Tor to be accessed.