Industry | News, how-tos, features, reviews, and videos
Eclypsium security researchers have uncovered UEFI vulnerabilities in the Illumina iSeq 100 DNA sequencer, but the broader issue involves the device development process at large.
The 2025 NDAA provides the US military with funding to rip Chinese gear out of telecom networks, protect mobile devices from foreign spyware, create an AI security center, and much more.
With responsibility versus authority a key CISO issue, many security execs express hesitancy in taking CISO positions, while security specialists suggest ways to protect them from taking the fall.
Integrity Tech has been accused of helping the advanced persistent threat group Flax Typhoon with the infrastructure needed to carry out its attacks.
The serviceman is also alleged to be the third member of the hacking group responsible for breaching customers of data warehousing company Snowflake earlier in the year.
A key used by third party service provider BeyondTrust to secure cloud-based remote support was stolen and used to access unclassified data, Treasury told lawmakers.
It’s a given that threats to enterprise are going to keep rising, stretching the resources of cybersecurity chiefs who must make their budgets go as far as possible. Here are some helpful strategies.
American Airlines flights were grounded for up to an hour on Dec. 24, while 71 JAL flights were delayed and four cancelled on Dec. 26.
The alarming news that Chinese-affiliated threat groups have likely infiltrated US telecommunications is a reminder to consider where you can harden communications on your network.
CrowdStrike, Change Healthcare, rising ransomware threats and cyber regulations — here’s what dominated the headlines this year and how CISOs and cyber pros are adapting.