The importance of creating an interconnected security infrastructure for IoT is crucial. In a world where everything is communicating with everything else it is not just business critical but vital that everything from smart city networks down to individual smart devices is secure.
Every organization needs a vulnerability management program in today’s high-risk environment. Learn how these programs work and how they prevent cyber attacks.
Cybersecurity practices are most effective when they are integrated as a way of life for employees, rather than a once-a-year IT requirement.
Security incidents happen; that’s just reality. But how a company decides to handle an event says more about their values and priorities than their product. The recent Okta compromise reminds us of the damage inflicted when there is a lack of transparency between a security vendor and its customers.
The term protestware recently made global news when organizations in Russia and Belarus were attacked by malicious code that wiped their computers’ files. This malware was distributed through the popular open source JavaScript library, node-ipc, and was introduced by its maintainer in retaliation for Russia's invasion of Ukraine.
With an immediate need to remedy the headcount shortage in cybersecurity, staffing a security operations center (SOC) is only half the battle though. We need to focus on cultivating our workplace culture to better retain talent.
Litigation against corporate board members and C-level executives for data privacy and security claims is on the rise. Recently, plaintiffs have targeted corporate board members and C-level executives alleging that their data privacy–related claims result from a breach of fiduciary duties.
By owning a trusted CA, Russia can also now host as many man-in-the-middle attacks, which are generally privacy attacks. Additionally, state-sponsored hacking groups can produce certificates for devices meant to intercept traffic and view all of the encrypted communications.
Emerging privacy enhancing technologies (PETs), such as federated learning, are the key building blocks in changing our relationship with data. They can unlock new opportunities while protecting individual privacy, maintaining control of valuable data, and simplifying compliance in an increasingly fragmented regulatory landscape.
APIs are the backbone of numerous popular web services because of their utility, ubiquity, and increasing architectural choices. Regardless of the API architecture chosen, there are shared factors that make them all vulnerable.










