Loading...
The day's top cybersecurity news and in-depth coverage
December 18, 2021
A sure-fire way to prevent exploitation of Log4j vulnerabilities has yet to appear, but these actions are your best bet for reducing risk. Read more â¶
The fallout from the Apache Log4j vulnerability continues as researchers discover a second exploit that could lead to denial-of-service attacks. A patch is available to fix the issue.
Zoom, Microsoft Teams, Google Meet, Cisco Webex, FaceTime, Tauria, Signal, Wire and WhatsApp. What does their encryption look like? What are the trade-offs?
Automated and open source tools can help you conduct web application, network, and database penetration tests.
Security leaders say their priorities reflect security needs due to recent shifts in their organizationâs IT and business environments, a changing threat landscape, and emerging risks.
Every CISO must evaluate their security programs against these four basic levels of security -- stay out of jail, table stakes, competitive and advantage -- in terms of business need.
© 2024