Nudge Security, an early stage startup promising to help organizations manage cybersecurity decisions, has emerged from stealth with a $7 million seed round. [Read More]
Apple is being called to task for neglecting to patch two "actively exploited" zero-day vulnerabilities on older versions of its flagship macOS platform. [Read More]
CashApp said the stolen data includes brokerage account numbers, full names, brokerage portfolio values, and brokerage portfolio holdings for one trading day. [Read More]
Four months since the Log4j issue exploded onto the internet, all the major affected vendors have released patches – but even where companies have patched, security experts warn it's a mistake to relax. [Read More]
Sequoia Capital is leading a $10.5 million Series A investment in Skiff, betting on a Silicon Valley startup building "products that are fully private and where users own their own data." [Read More]
Attack surface management specialists Cyberpion has secured $27 million in early-stage funding to build technology that helps organizations manage exposure to risk. [Read More]
Threat hunters at Checkmarx raise an alarm after discovering a threat actor fully automating the creation and delivery of "hundreds of malicious packages" into the NPM ecosystem. [Read More]
To communicate about our metrics, we need ways that we can ground our experience in terms of “normal” for us; Otherwise, we really can't communicate our metrics effectively with anyone who isn't in a similar environment.
Security is a creature of habit. Security likes things to stay the same. Change brings chaos. Chaos is bad for security. But, we can help control the security of our environment by following good security habits.
A new amendment to Texas' breach notice law is designed to make it easier for Texas entities to comply with Texas law by giving those entities the choice of notifying under Texas law or the law of residents of other states.
While regulations and ensuing IT audits go beyond firewalls and firewall policies, these devices are often a good place to start when it comes to becoming "audit-ready" and gaining continuous visibility of what's going on in your network.
Too many IT and risk managers are surprised by security breaches, compromised keys or operational failures that occur from sheer neglect that result when you leave your valuable keys as exposed as a password on a post-it. Hefty, potential fines for failing to comply with regulations are risk enough, but the risks of ignoring these vulnerabilities extend even further.
The vast majority of ISVs are focused on prospecting and lead generation while overlooking potential sales funnel leakage due to piracy. Any vendor that is serious about its longevity needs to know if it has a software piracy problem.