Q&A: The Outlook for Israeli Cyber Startups, As War Clouds Gather
Amid the burgeoning war, Israel's tech sector is focused on resilience. Ofer Schreiber, senior partner at YL Ventures, weighs in…
Amid the burgeoning war, Israel's tech sector is focused on resilience. Ofer Schreiber, senior partner at YL Ventures, weighs in…
State-sponsored cyber-espionage actors from Russia and China continue to target WinRAR users with various info-stealing and backdoor malware, as a…
The state-sponsored threat actors (aka APT34, Crambus, Helix Kitten, or OilRig) spent months seemingly taking whatever government data they wished,…
It's time to build a culture of privacy, one that businesses uphold.
Should CISOs include only known information in the SEC filings for a material security incident, or is there room to…
The router specialist says the attacker's claims to have heisted millions and millions of records are significantly overblown. But an…
The sensitive nature of medical records, combined with providers' focus on patient care, make small doctor's offices ideal targets for…
Analysis of more than 1.8 million admin portals reveals IT leaders, with the highest privileges, are just as lazy about…
Under the Security Appraisal Framework and Enablement (SAFE) program, device manufacturers will be able to work with approved auditors to…
The latest threat to Citrix NetScaler, CVE-2023-4966, was exploited as a zero-day bug for months before a patch was issued.…