Spain's prime minister vowed to tighten oversight of the country's secret services in the wake of a scandal over the hacking of top politicians' mobile phones that has roiled his fragile coalition government. [Read More]
SYN Ventures has closed a new $300 million fund and announced the addition of serial entrepreneur Ryan Permeh as full-time operating partner. [Read More]
Broadcom announces acquisition of VMware for $61 billion in cash and stock, and VMware will absorb Broadcom’s security software solutions as part of the deal. [Read More]
Several critical and high-severity vulnerabilities have been found in the Open Automation Software Platform, used for connectivity between ICS, databases and apps. [Read More]
witter will pay a $150 million penalty and put in new safeguards to settle federal regulators’ allegations that the social platform failed to protect the privacy of users’ data over a six-year span. [Read More]
Xona Systems, an Annapolis MD-based provider of remote authentication and access to the critical infrastructure, has raised $7.2 million in Series A funding. [Read More]
As IoT adoption increases within healthcare, healthcare organizations and device manufacturers will need to prioritize the security of connected medical devices to keep patient data private and ensure the safety of the patient.
In addition to helping security teams recruit and retain the talent they need, employee wellness brings other benefits. Here are five ways in which wellness is good for security:
There are seven immediate steps you can take to put your organization on the path toward better situational awareness and risk reduction to protect critical infrastructure.
Most organizations want to adopt DevSecOps practices, but their current practices are closer to traditional waterfall methodologies than the agile practices described in this DevSecOps manifesto.
Linux is becoming a more popular target for attackers as it operates the back-end systems of many networks and container-based solutions for IoT devices and mission-critical applications.
With the labor market for cybersecurity pros being extremely tight, the old ways of recruiting are rife with weaknesses and biases, while the urgency to recruit people is intense.