Vulnerability Exploits, Not Phishing, Are the Top Cyberattack Vector for Initial Compromise A slew of Microsoft Exchange vulnerabilities (including ProxyLogon) fueled a surge in attacks targeting software flaws in 2021, but the trend has continued this year.
Zane Lackey: 'Technology Is the Easy Bit' Security Pro File: The DevOps evangelist and angel investor shares his expertise with the next generation of startups. If you're lucky, maybe he'll even share his Lagavulin.
LATEST FROM DR TECHNOLOGY
The 3 Fundamentals of Building an Effective IoMT Security Strategy The high stakes and unique priorities for Internet of Medical Things devices require specialized cybersecurity strategies.