7 Ways to Mitigate Supply Chain Attacks Breaches caused by external vendors and service providers have become a major and escalating problem for organizations.
How Hackers Infiltrate Open Source Projects The dependency trees of modern software-development make smaller open-source projects vulnerable to hackers sabotaging code.
Office 365 Multifactor Authentication Done Right Why the ubiquitous nature of Office 365 poses unique challenges for MFA-based security and how organizations can protect themselves.
Chronicle Folds into Google Alphabet's enterprise cybersecurity division will become part of the Google security portfolio.
New Exploit for Microsoft Excel Power Query Proof-of-concept, which allows remote code execution, is latest to exploit Dynamic Data Exchange (DDE) and is another reminder why organizations must ensure Office settings are secure.
More Supply, More Demand: Cybersecurity Skills Gap Remains Although the number of programs for training workers in cybersecurity skills has increased, as well as the number of graduates, the gap in supply and demand for cybersecurity-skilled workers is essentially unchanged, leaving companies to struggle.
NIST Issues IoT Risk Guidelines A new report offers the first step toward understanding and managing IoT cybersecurity risks.
Former Equifax CIO Sentenced to Prison for Insider Trading Jun Ying is the second Equifax employee found guilty of insider trading related to the massive 2017 data breach.