Protecting Privacy Using the CIS Controls Privacy Guide
The CIS Controls Privacy Guide provides best practices and guidance for implementing the CIS Critical Security Controls (CIS Controls) while considering the privacy impacts on...
Access broker found exploiting Log4j vulnerability in VMware
A gang of cybercriminals known for breaking into computer systems and selling access to them has been discovered exploiting an Apache Log4j vulnerability, Log4Shell, in ...
Mentoring and Role Models Key to Improving Female Representation in Cybersecurity
Mentoring and Role Models Key to Improving Female Representation in Cybersecurity The importance of mentoring and role models in helping women develop careers in cybersecurity...
Nearly $9bn Laundered in Cryptocurrency in 2021
Nearly $9bn Laundered in Cryptocurrency in 2021 Threat actors laundered $8.6bn in cryptocurrency last year, although the real figure could be much higher when “non-crypto”...
DevSecOps plan process
In the DevOps and DevSecOps Introduction, What is DevOps, we reviewed how our security teams overlay onto DevOps for visibility and increased security throughout the...
QNAP: Act Now to Mitigate DeadBolt Ransomware
QNAP: Act Now to Mitigate DeadBolt Ransomware A leading maker of network-attached storage (NAS) devices is urging customers to upgrade to the latest software version...
Multiple Vulnerabilities in Apple Products Could Allow for Arbitrary Code Execution.
Multiple vulnerabilities have been discovered in Apple Products, the most severe of which could allow for arbitrary code execution. iOS is a mobile operating system...
12 steps to take when there’s an active adversary on your network
CISOs know they must respond quickly and effectively to an incident, yet surveys point to continuing challenges to deliver on that goal. The State of...
IT and DevOps Staff More Likely to Click on Phishing Links
IT and DevOps Staff More Likely to Click on Phishing Links IT staff are more likely to click on phishing links and are often worse...
North Korea Loses Internet in Suspected Cyber-Attack
North Korea Loses Internet in Suspected Cyber-Attack North Korea has experienced an internet outage that may have been caused by a cyber-attack. The country lost...