Proposed US Guidance, Legislation Show Increasing Importance of Cloud Security
The United States is working on guidance and legislation that show the government is placing increasing importance on cloud security. The US Cybersecurity and...
The United States is working on guidance and legislation that show the government is placing increasing importance on cloud security. The US Cybersecurity and...
The volume of attacks on IoT and OT devices is increasing and in many cases these systems were specifically targeted by threat actors, according...
The risks associated with supply chain (for software and services) is huge and growing. A new report shows that boardroom awareness and budgets for third-party risk management has...
Nozomi Networks and the SANS Institute released a survey showing companies are investing more in industrial control system (ICS) cybersecurity to match the increasingly...
Research finds that adversaries could detect a new misconfigured container within an average of five hours Attacks against the container infrastructure are continuing to...
Adversaries are turning their focus on cheaper, easier targets within an organisation’s supply chain, especially as businesses increasingly acquire software from external suppliers. In...
The traditional network perimeter has been replaced with multiple edge environments. These include WAN, multi-cloud, IoT, home offices, the new device edge, and more....
Complexity is the bane of effective cybersecurity. The need to maintain an increasing array of cybersecurity tools to protect organizations from an expanding set...
Inside Verizon’s 2019 Data Breach Investigations report ZDNet’s Larry Dignan tells TechRepublic’s Karen Roby that the contents of Verizon’s 2019 Data breach Investigations report...
Business is Now the Primary Target for Ransomware, and Nation-States are Among the Attackers The revenue gap in ransomware distribution is continuing to grow....