Patch Now: 2 Apple Zero-Days Exploited in Wild The fact that the flaws enable remote code execution, exist across all major Apple OS technologies, and are being actively exploited heightens the need for a quick response.
Expiring Root Certificates Threaten IoT in the Enterprise What happens when businesses' smart devices break? CSOs have things to fix beyond security holes.
LATEST FROM DR TECHNOLOGY
Transitioning From VPNs to Zero-Trust Access Requires Shoring Up Third-Party Risk Management ZTNA brings only marginal benefits unless you ensure that the third parties you authorize are not already compromised.