Loading...
The day's top cybersecurity news and in-depth coverage
December 24, 2021
Software dependencies and third-party products make detecting Log4j exploits tough, but this advice and some specialized tools can help. Read more â¶
The Apache Log4j vulnerability has impacted organizations around the globe. Here is a timeline of the key events surrounding the Log4j exploit as they have unfolded.
Security startups are often innovation leaders that attempt to solve critical and persistent problems. These are some of the most interesting ones to watch as they tackle issues around multicloud security, identity management, zero-trust, and more.
The top security job has evolved from a technology-focused role into an executive position. Does your resume reflect that shift?
It's time to review (or create) your travel security program now that more people are traveling for work and pleasure. Here's what it should include.
Identity is becoming the new perimeter, and these IAM tools have evolved to help secure assets as organizations rely less on traditional perimeter defenses and move to zero-trust environments.
GitHub has a ton of open-source options for security professionals, with new entries every day. Add these tools to your collection and work smarter.
© 2024