Guidelines for Managing the Security of Mobile Devices in the Enterprise: NIST Publishes SP 800-124 Revision 2
Today mobile devices are ubiquitous, and they are often used to access enterprise networks and systems to process sensitive data.…
Today mobile devices are ubiquitous, and they are often used to access enterprise networks and systems to process sensitive data.…
Here’s a situation most of us can relate to: We find ourselves facing a dull moment—maybe standing in a checkout…
You can almost always find Twitch streamer Juan Guarnizo in a crowd by listening for his very loud and unique…
Cisco fixed nine flaws in its Small Business Series Switches that could be exploited to execute arbitrary code or cause…
Digitalization initiatives are connecting once-isolated Operational Technology (OT) environments with their Information Technology (IT) counterparts. This digital transformation of the…
The rising geopolitical tensions between China and Taiwan in recent months have sparked a noticeable uptick in cyber attacks on…
The notorious cryptojacking group tracked as 8220 Gang has been spotted weaponizing a six-year-old security flaw in Oracle WebLogic servers…
Converso, a relatively new privacy-focused messaging service, has withdrawn its application from both the Google and Apple app stores amid…
The NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE) announced that Ukraine, Ireland, Japan and Iceland joined the organization. The…
Cisco has released updates to address a set of nine security flaws in its Small Business Series Switches that could…