CSOs Jaya Baloo and Jonathan Trull discuss the route, role, and requirements in becoming and being a successful CISO.
Hi, what are you looking for?
CSOs Jaya Baloo and Jonathan Trull discuss the route, role, and requirements in becoming and being a successful CISO.
Cisco Talos has a blog post on the BlackByte ransomware group’s continuing evolution and new TTPs.
SaaS applications are so easy to use, the decision, and the deployment, is sometimes undertaken by the business unit user with little reference to,...
Hackers gained access to the switch using valid administrator credentials, and then ‘jailbroke’ from the application level into the OS level.
Ransomware isn't just about malware. It's about brands, trust, and the shifting allegiances of cybercriminals.
An inside look at how LinkedIn developed an internal AI-assisted vulnerability management system to protect its massive infrastructure and user base.
National Public Data (NPD) has confirmed suffering a data breach, but the company says the incident only affects 1.3 million people in the US.
National Public Data (NPD) is at the center of controversy with allegations of a massive data breach involving 2.9 billion records. Despite media coverage...
SecurityWeek spoke with Mike Britton, CISO at Abnormal Security, to understand what the company has learned about current social engineering and phishing attacks.
Many hackers trace their origin to an interest in, and early exposure to, computers. Tom Anthony is no different.
SecurityWeek speaks to Michael Osborne, CTO of IBM Quantum Safe, for a better understanding of the need for and principles of quantum safe cryptography.
SaaS app log analysis highlights the rapid smash and grab raid: in, steal, and leave in 30 minutes.
In modern security parlance, ‘immutable’ has three primary associations: immutable servers, immutable backup, and immutable data.
The UK Information Commissioner’s Office announced its intention to fine Advanced Computer Software Group £6.09 million.
The ransomware scourge is still growing and still successful for attackers, Rapid7’s Ransomware Radar Report 2024 shows.
The average cost of a data breach jumped to $4.88 million from $4.45 million in 2023, a 10% spike.
Android malware can intercept and steal OTPs and login credentials, leading to complete account takeovers.
Researchers discovered and published details of an XSS attack that could potentially impact millions of websites around the world.
Zest Security emerged from stealth with $5 million funding and an AI-powered platform that resolves the root source of risk in the cloud.
Sygnia discovered what it believes to be a variant of the GhostEmperor infection chain leading to the Demodex rootkit – which was first seen...