NortonLifeLock Willfully Infringed Malware Patents
Jury finds cybersecurity company violated Columbia University’s rights over two patents Read More
Ransomware Attack Closes Michigan College
Cyber-attack forces Kellogg Community College to cancel classes at five campuses Read More
How to Choose a Modern CSPM Tool to Reduce Your Cloud Infrastructure Risk
Cloud Security Posture Management solutions have become a must for detecting and fixing misconfigurations in public clouds – from code to runtime. As organizations eagerly...
Lockbit ransomware attack cripples parts of German library service
One of the largest library services in Germany, EKZ Bibliotheksservice, has been impacted by a ransomware attack that has left book lovers unable to rent...
Cops ignored call to nearby robbery, preferring to hunt Pokémon
A police car's digital in-car video system uncovered that two Los Angeles officers ignored calls to provide assistance at a department store robbery because they...
TLS implementation flaws open Aruba and Avaya network switches to RCE attacks
Multiple series of network switches manufactured by Aruba Networks, owned by Hewlett Packard Enterprise, and Avaya, owned by Extreme Networks, are vulnerable to attacks that...
How and why you should secure APIs
This blog was written by an independent guest blogger. APIs are a crucial tool in today’s business environment. Allowing applications to interact and exchange data...
Mental Health and Prayer Apps Fail the Privacy Test
Mozilla finds most are neither secure nor protect user privacy Read More
Car Rental Giant Sixt Hit by Cyber-Attack
Firm admits temporary disruption to operations Read More
Secrets to building a healthy CISO-vendor partnership
Effective partnerships between CISOs and their cybersecurity vendors are integral to security success. A well-oiled relationship built on trust, communication and mutual understanding can reap...