Best & Worst Reproductive, Mental Health Applications according to Mozilla Foundation
The applications that are included in the category of sexual and reproductive health have deficiencies in the protection of user privacy, as determined by the Mozilla Foundation in its guide…
Securing Your Organization During Global Turmoil
Repelling Cyber Criminals Trying to Capitalize on a Crisis By Kevin Orr, President, RSA Federal Current geopolitical crises […] The post Securing Your Organization During Global Turmoil appeared first on…
New Deep Instinct partner program targets MSSPs fighting ransomware
Cybersecurity firm Deep Instinct has rolled out a new partner program to provide its endpoint and application protection software to managed security service providers (MSSPs), the company announced Wednesday. The…
Universal database of device vulnerability information launched
A universal database of agentless devices currently being used on enterprise networks has been announced by DeviceTotal. The new repository allows the company’s customers to identify the accurate security posture…
Global software spending to grow despite headwinds: Forrester
Global spending on software will continue to grow despite headwinds in the form of inflation, geopolitical risks and labor shortages, a new report from Forrester shows. Driven to a large…
Building a Foundation for VSM Success: Pointers from a Successful Insurance Leader
A lot is being written about VSM, and for good reason: it offers the opportunity for organizations to benefit from increased alignment, accelerated innovation, reduced risk, and improved competitive advantage.…
Managing the whole lifecycle for human and machine authentication
In my last column for CIO.com, I outlined some of the cybersecurity issues around user authentication for verification of consumer and business accounts. Among other things, I advocated that in…
Protecting S3 from Malware: The Cold Hard Truth
Cloud object storage is a core component of any modern application, but most cloud file storage security is insufficient.
Google Chrome Zero-Day Found Exploited in the Wild
The high-severity security vulnerability (CVE-2022-2856) is due to improper user-input validation.
‘DarkTortilla’ Malware Wraps in Sophistication for High-Volume RAT Infections
The stealthy crypter, active since 2015, has been used to deliver a wide range of information stealers and RATs at a rapid, widespread clip.