Loading...
The day's top cybersecurity news and in-depth coverage
February 23, 2022
Researchers, academics, and enthusiasts can now contribute to and benefit from free, open-source security data on software supply chain vulnerabilities. Read more â¶
Here's what IT and security admins for Microsoft networks need to know about recent changes to Office and Windows.
NotPetya proved the effectiveness of an attack on the software supply chain, and attackers are targeting it more now. Here's advice to reduce risk to your DevOps processes.
Departing Motorola employees took thousands of documents with them in 2008 when they were hired by a competitor, but it wasn't discovered until 2017.
Software bills of material are having a moment, but the costs of an externally visible SBOM are likely to outweigh the benefits, says Andy Ellis.
DNS security firm's AppAware identifies risky apps and helps to subdue them.
ThreatEye NV combines behavior analysis and machine learning to expose malware in encrypted network traffic.
âWe have better security success when the developers are taking part in it,â says James Chandler, VP of security for Western Governors University.
© 2024