Security Pros Warn That EU's Vulnerability Disclosure Rule Is Risky The Cyber Resilience Act's requirement to disclose vulnerabilities within 24 hours could expose organizations to attacks — or government surveillance.
Passkeys Are Cool, But They Aren't Enterprise-Ready The passwordless technology is becoming popular because Apple, Google, and Microsoft have a solution for accounts recovery, but enterprises are slow-walking their passkey adoption plans.
Insurance Companies Have a Lot to Lose in Cyberattacks Not only do insurance companies collate sensitive information from their clients, but they also generate their own corporate data to protect.
New California Delete Act Tightens Rules for Data Brokers Companies with customers in California need to prepare for a new process for demanding deletion of personal data.
In Search of Rust Developers, Companies Turn to In-House Training Google, Fortanix, and other firms have aimed to train a cadre of Rust developers, betting that the additional cost will be offset by security savings.
Name That Edge Toon: Office Artifacts Come up with a clever caption, and our panel of experts will reward the winner with a $25 Amazon gift card.
Making the Case for Cryptographic Agility and Orchestration Finding the right post-quantum cryptographic (PQC) algorithms is necessary, but not sufficient, to future-proof cybersecurity.
How to Scan Your Environment for Vulnerable Versions of Curl This Tech Tip outlines how enterprise defenders can mitigate the risks of the curl and libcurl vulnerabilities in their environments.
Quash EDR/XDR Exploits With These Countermeasures With tools and hacker groups constantly evading defenses, expanding cybersecurity beyond endpoint security becomes crucial.
Protect AI Releases 3 AI/ML Security Tools as Open Source NB Defense, ModelScan, and Rebuff, which detect vulnerabilities in machine learning systems, are available on GitHub.
Nexusflow Slots GenAI Into SOC Automation The startup claims its private AI software is working on making decisions based on generalizing from examples.