Loading...
The day's top cybersecurity news and in-depth coverage
December 16, 2021
Zoom, Microsoft Teams, Google Meet, Cisco Webex, FaceTime, Tauria, Signal, Wire and WhatsApp. What does their encryption look like? What are the trade-offs? Read more â¶
While the holidays are a busy and exhausting time in retail, by working smart and maximizing the technology and partnerships you have in place, the season can be safe and successful for everyone.
The Log4j vulnerability affects many applications running on Microsoft networks. Use this advice to determine whether your network has been exploited and to mitigate the issue.
Security leaders say their priorities reflect security needs due to recent shifts in their organizationâs IT and business environments, a changing threat landscape, and emerging risks.
Understanding threat actors and the tactics they use informs how Rohrbaugh develops his cybersecurity strategy, allocates resources, and leads his team.
Every CISO must evaluate their security programs against these four basic levels of security -- stay out of jail, table stakes, competitive and advantage -- in terms of business need.
New joint solution enhances ability to predict, detect, and respond to cyberattacks at scale across endpoints, networks, identities, cloud, and workspaces.
The vulnerability affects not only Java-based applications and services that use the library directly, but also many other popular Java components and development frameworks that rely on it.
© 2024