The vulnerability gives attackers a way in through the internet, but that’s not the whole extent of the risk.
Manual penetration testing is quickly becoming obsolete, with AI-powered tools offering a way to cover the bases.
When enterprises adopt new technology, security is often on the back burner. It can seem more important to get new […]
Whether through fraud or legitimate purchase, cybercriminals increasingly depend on mainstream services to support their activities.
New regulations like GDPR and CCPA can have a positive effect on security, but they can also get in the way of developing smart security tools.
Old data may not be of much value to a business, but it can command top bitcoin on the dark web.
Cyber criminals are targeting application programming interfaces to steal sensitive data. Recent exposures and hacks at companies like Venmo, Facebook and Google present lessons to improve API security.
The vulnerability is a reminder that apps on your employee’s phones represent a huge attack surface for your enterprise network.
California’s new privacy law, AB 375, might not burden security as much as the GDPR, but details are subject to change.
Experts warn that BlueKeep attacks are on their way, and at least a million machines are vulnerable.
It’s often difficult to make log files and other data from legacy applications accessible to security information and event management systems. Here are some options for improving visibility.
Low code does not mean low risk. By allowing more people in an enterprise to develop applications, low-code development creates new vulnerabilities and can hide problems from security.
Recent studies and surveys indicate that improperly configured public cloud instances continue to turn sensitive data into low hanging fruit.
As more data center managers move to private, public, and hybrid cloud infrastructures, new security challenges emerge, but clouds also offer new technologies to help meet security challenges.
Breaches from attacks that defeat or run around endpoint protection measures are on the rise. Here’s how attackers do it.