The day's top cybersecurity news and in-depth coverage
August 22, 2022
Printers are essentially computers attached to your network and should be protected accordingly. Here's how. Read more â¶
Social engineering tactics â using the art of deception in cyberattacks â have climbed to the top spot as the #1 cause of cybersecurity breaches. Learn how researcher make the case for adopting a multi-tiered cybersecurity strategy so you can protect your business from social engineering threats.
Each cloud platform differs in the security tools and features it offers customers to help them protect their cloud assets.
Open RAN enables interoperability among hardware, software, and interfaces used in cellular networks but also changes their attack surface.
Security startups are often innovation leaders. These are some of the most interesting ones to watch as they tackle issues around cloud security, asset management and more.
CISO Stephanie Franklin-Thomas advances ABMâs security program with a holistic approach to zero trust, putting equal emphasis on people, process, and technology.
Understanding the differences between these widely used software bill of materials format standards is important, but your tools will likely need to support both.
Meltdown and Spectre raised the alarm over vulnerabilities that attackers can exploit in popular hardware and its firmware. This list, though not comprehensive, presents the most significant threats.