- Welcome Guest
- Sign In
The Linux Foundation and the Open Source Software Security Foundation brought together over 90 executives from 37 companies and government leaders from the NSC, ONCD, CISA, NIST, DOE, and OMB to reach a consensus on key actions to take to improve the resiliency and security of open-source software.
Plugins or other software dependencies can inadvertently or maliciously introduce vulnerabilities or data leaks that can expose e-commerce site users to risk.
Research by a cybersecurity services provider reveals how widespread the risks are to executives and the organizations they ramrod from data brokers collecting sensitive data about them. "We see corporate executives targeted all the time in their personal lives," BlackCloak Founder and CEO Chris Pie...
Exclusive Interview with Appdome CEO Tom Tovar about no-code technology, the state of mobile app security and fraud prevention.
The massive takedown of RaidForums might have little real impact against the large volume of hackers operating worldwide, since many of Raid's members could flock to alternative platforms.
Forrester also called out the work-from-anywhere trend as a major threat in 2022. It explained that an anywhere-work model presents an opportunity to create new kinds of sensitive data.
IT security firm NeoSystems last week announced it would host a panel of experts from the private and public sectors Tuesday centered around the cybersecurity implications of the ongoing conflict in Ukraine. TechNewsWorld sat in on the Zoom-delivered panel discussion.
The modern attack surface has grown too large and complex for security professionals to manage using traditional, manual approaches to the asset lifecycle.
This annual event is a most-popular time for betting pools and bracket challenges -- when employees often use websites, online platforms, or shared spreadsheets to organize. Hackers have countless ways to entice you to engage with them. These ruses include the promise of bigger winnings or insider i...
Internal documents recently leaked by a member of the Conti ransomware group reveal the gang's status as a multi-layered business organization. These chat logs present a deep dive into the gang's revenue numbers, leaders, recruiting practices and operations, and victims.
Under the new Critical Infrastructure Defense Project, companies in particularly vulnerable industries -- such as hospitals and water and power utilities -- will have access to the full suite of Cloudflare's Zero Trust solution, CrowdStrike's endpoint protection and intelligence services, and Ping I...
For many newcomers to crypto investing the learning curve can be steep. There may be hesitancy if people do not feel comfortable with the level of security on a given crypto platform. Accordingly, there needs to be a level of trust built by the platforms to ease the minds of people just getting star...
Government agencies have discovered a deadlier new home and office network device killer malware that replaces weaker VPNFilter code. U.S. and U.K. governments published a joint report Wednesday detailing a new malware strain developed by Russia's military cyber unit deployed in the wild since 2019....
Amid the twists and turns coming out of 2021, we've seen some overarching e-commerce-related themes -- from changes in consumer privacy, to the growing prevalence of rewards incentives, to the changing role of financial services providers -- that companies should take note of as we move head in 2022...
Social Media
See all Social Media