3 Ways to Expand the Cyber Talent Pool From Splash Pad to Watering Hole Why and how "unqualified" candidates will fill the reservoir with the security workers America is thirsty for.
Thoma Bravo Makes 'Practical' Decision to Merge ForgeRock Into Ping Identity The private equity from has invested billions of dollars in identity and access management (IAM), but now it's on Ping founder and CEO Andre Durand and his team to rationalize overlapping product lines.
Software Supply Chain Strategies to Parry Dependency Confusion Attacks Bad actors practice to deceive package managers with a tangled web of methods. Here's how to hoist them by their own petard.
6 Ways AI Can Revolutionize Digital Forensics Artificial intelligence tools can automate the analysis of logs, video, and other important but tedious aspects of investigations.
Microsoft, Google Take on Obsolete TLS Protocols Google shortened the lifetime of Transport Layer Security (TLS) certificates, and Microsoft plans to downgrade support for older versions, giving companies more data security but also removing visibility into their own traffic.
Name That Edge Toon: Prized Possessions Come up with a clever caption, and our panel of experts will reward the winner with a $25 Amazon gift card.
Cybersecurity Builds Trust in Critical Infrastructure Improving an energy company's resistance to cyberattack does more than protect vital resources — it enhances trust from customers and investors.
Coding Tips to Sidestep JavaScript Vulnerabilities This Tech Tip focuses on best security practices to write secure JavaScript code.
MOVEit Breach Shows Us SQL Injections Are Still Our Achilles' Heel SQL injection and its ilk will stop being "a thing" only after organizations focus on security by construction.
Authentication Outage Underscores Why 'Fail Safe' Is Key Duo's service outage last week, impacting schools and businesses, highlights how companies should build in resiliency and business continuity into their authentication schemes.