Required MFA Is Not Sufficient for Strong Security: Report Attackers and red teams find multiple ways to bypass poorly deployed MFA in enterprise environments, underscoring how redundancy and good design are still required.
What to Know About Updates to the PCI Secure Software Standard New requirements add 50 controls covering five control objectives. Here's a high-level look at each objective.
Ransomware Is Not the Problem Arbitrarily powerful software -- applications, operating systems -- is a problem, as is preventing it from running on enterprise systems.