News

  • UK Sets Out Nuclear Cybersecurity Strategy

    PRIVACY PRIVACY More testing and more collaboration on the way Read More

    Read More

  • 12 steps to building a top-notch vulnerability management program

    PRIVACY PRIVACY Security executives have long known the importance of addressing vulnerabilities within their IT environments. And other executives in the C-suite have also come around to the criticality of this task, given the number of high-profile breaches that happened as a result of an unpatched system. [ Learn 8 pitfalls that undermine security program…

    Read More

  • Over 20,000 Zyxel Firewalls Still Exposed to Critical Bug

    PRIVACY PRIVACY Rapid7 complains of vendor’s silent patching process Read More

    Read More

  • Upcoming Speaking Engagements

    PRIVACY PRIVACY This is a current list of where and when I am scheduled to speak: I’m speaking on “Securing a World of Physically Capable Computers” at OWASP Belgium’s chapter meeting in Antwerp, Belgium, on May 17, 2022. I’m speaking at Future Summits in Antwerp, Belgium, on May 18, 2022. I’m speaking at IT-S Now 2022…

    Read More

  • Friday Squid Blogging: Squidmobile

    PRIVACY PRIVACY The Squidmobile. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines here. Read More

    Read More

  • Intel bets big on security as a service for confidential computing

    PRIVACY PRIVACY Intel revealed a string of security advancements at its inaugural Intel Vision event this week, including Project Amber — a security as a service initiative for confidential computing — as well as increased collaboration for secure and responsible developments in AI, and a phased approach to quantum-safe cryptography. Project Amber is aimed at…

    Read More

  • EU Agrees New Cybersecurity Legislation for Critical Services Organizations

    PRIVACY PRIVACY The rules will apply to medium and large organizations operating in critical sectors like healthcare and water management Read More

    Read More

  • Locate Tenable Compliance Templates Faster with Revamped Portal

    PRIVACY PRIVACY Following a portal relaunch, Tenable’s Audit Files are now easier to find and manage, thanks to a new search engine that supports a variety of search query criteria. Complying with in-house IT policies, industry mandates, vendor configuration recommendations and government regulations is critical for a solid cyber security posture. That’s why Tenable provides…

    Read More

  • What’s a Parent to Do? Closing the Protection Gap between You and Your Children.

    PRIVACY PRIVACY Hands down, children look to their parents to keep them safe online more than anyone else, which begs the question—what’s a parent to do? Our recent study on connected families found that nearly three-quarters of children said their parents were best suited to teach them about staying safe online, nearly twice than teachers…

    Read More

  • Five Eyes nations warn MSPs of stepped-up cybersecurity threats

    PRIVACY PRIVACY In an unexpected development, the cybersecurity authorities of the “Five Eyes” countries issued an alert warning of an increase in malicious cyber activity targeting managed service providers (MSPs), with these agencies saying they expect this trend to continue. The alert is the result of a collaborative effort among the United Kingdom (NCSC-UK), Australia…

    Read More

News, Advisories and much more

Exit mobile version