Loading...
The day's top cybersecurity news and in-depth coverage
January 11, 2022
Researchers warn of critical Java flaw impacting the console of the H2 Java SQL database. Users are advised to update their H2 database to mitigate remote code execution risk. Read more â¶
From the oil rig to the gas pump, most large fuel distribution companies are involved in just about every aspect of fuel exploration, extraction, production, and distribution.
The U.S. Federal Trade Commission also threatened possible legal action for companies that don't address the risk from the Log4j vulnerabilities.
Companies have greater confidence in their own security teams than in MSSPs, according to a new survey. To better evaluate service provider capabilities, companies can apply techniques used by the ATT&CK (adversarial tactics, techniques, and common knowledge) assessment framework to MSSPs, MITRE says.
Is that security trend hot or not? From tools and technologies to threats, tactics, and training, the numbers don't lie.
Hybrid cloud environments can add complexity, reduce visibility, and require different logging and monitoring approaches for security teams.
Personally identifiable information (PII), is any piece of data that could be usedâeither alone or when combined with other dataâto identify an individual. Some types of PII are obvious, such as a name or Social Security number, but others are more subtle.
Seeing opportunities in the mass move to remote work, cyberattackers are updating their tactics, compelling security leaders to respond. Experts make their predictions about threat reduction, compliance, supply chain management, security spending and more.
© 2024