As cloud computing, DevOps and automation continue to evolve, the lines between IT functions are fading, making security ...
Koh is a thought leader, and risk, compliance and governance expert with more than 25 years of experience covering banking, finance, cards and payment sectors. He has worked in various risk management ...
Recent mega data breaches involving third party vendors - such as the Change Healthcare cyberattack - are intensifying the ...
The healthcare sector is plagued by increasingly complex cyberthreats, and simply meeting compliance standards is not doing ...
Apple wants to dismiss its 2021 lawsuit against Israeli spyware maker NSO Group out of concern that continuing the lawsuit ...
Google patched a critical remote execution vulnerability in its cloud platform Cloud Composer service, "CloudImposer," which ...
U.S. federal prosecutors indicted a Chinese national employed by a state-owned aerospace and defense conglomerate with a ...
Whether you’re a seasoned CISO or mobile app developer, the goal is to arm you with the knowledge and tools you need to ...
Excessive deployment of remote access tools in operational technology environments expands attack surfaces and creates ...
The Telehouse North Two Data Center in London (Image: Telehouse) The U.K. government on Thursday designated data centers as part of its critical national infrastructure in a move intended to prevent ...
David Weston, vice president of enterprise and OS security, Microsoft (Image: Microsoft) Reducing kernel-mode dependencies and adopting safe deployment practices will make endpoint systems more ...
This week, cyberthreats rising in Mexico; FBI warned of BEC scams; U.K. police arrested hacking suspect; Avis, Slim CD, Medicare and Fortinet disclosed breaches; ...