Cybersecurity agencies around the world have issued advisories and alerts for a recently disclosed DoS vulnerability affecting OpenSSL, and vendors have started assessing the impact of the flaw on their products. [Read More]
Secretary of State Mike Pompeo accused U.S. universities of caving to Chinese pressure to blunt or bar criticism of the Chinese Communist Party. [Read More]
Google confirmed it is banning location tracking software developed by data collection firm X-Mode Social from apps on Android-powered mobile devices. [Read More]
A Russian citizen living in Denmark has been charged with espionage for allegedly having provided information about Danish energy technology, [Read More]
OpenSSF announces an open source tool designed for evaluating the ability of static analysis security testing (SAST) products to detect vulnerabilities. [Read More]
A late October cyberattack on the computer systems of the University of Vermont Medical Center is costing the hospital about $1.5 million a day in lost revenue and recovery costs, its CEO said. [Read More]
The EU's medicines regulator targeted in cyberattack, just weeks before it is due to decide on special approval for two coronavirus vaccines. [Read More]
Curated threat intelligence is an essential capability of the SOC, enabling tools and teams to work more efficiently and effectively to optimize everything from incident response to threat hunting.
With the pandemic creating a massive remote work shift and consequent rises in cyber risk, finding individuals with cybersecurity skills is harder than ever.
Keeping a ‘six foot distance’ between our digital home life and digital work life can go a long way when it comes to safeguarding our most sensitive data, too.
In lock step with digital transformation projects, organizations are adopting the best practice of centralizing responsibility and accountability for securing the OT environment with the CISO.
Knowing that threat intelligence is readily available and proving its worth is one thing, understanding how to use it within your security operations program is quite another.
When intelligence becomes a capability and not just subscriptions to feeds, we can gain the full value of intelligence as the foundation to security operations.