What Do CISOs Have to Do to Meet New SEC Regulations?
As stringent new SEC reporting rules take effect, CISOs need to assess internal processes and understand their responsibilities. But there's…
As stringent new SEC reporting rules take effect, CISOs need to assess internal processes and understand their responsibilities. But there's…
Although the unauthenticated Java deserialization flaw has been known since 2015, GWT apps remain vulnerable to malicious server-side code execution,…
U.S. Venture Partners leads the round, CrowdStrike co-founder participating.
Seven months after our first investigation, a fuller portrait of the criminal gang and its tactics emerges
In the second of our new technical thought leadership series, Sophos X-Ops takes a detailed look at anti-ransomware techniques
Crimeware-as-a-service (CaaS) gang flies past CAPTCHAs, creating fraudulent accounts to sell to the likes of Scattered Spider; Microsoft mounts a…
Three years after the SolarWinds attack, new revelations show more must be done to help prevent such a drastic security…
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
Zoom's Vulnerability Impact Scoring System calculates the impact of a vulnerability to assign a cash payout for bugs, leading hackers…
Iranian officials blame a software issue for the "disruption" to gasoline pumps.