News
Insider Threats: Why These Cybersecurity Incidents Continue to Grow
With the rising threat of ransomware and other attacks that originate from outside organizations’ networks, it’s easy to forget the damage that an...
Ice Phishing Takes Advantage of Tectonic Shift to Web3
The Badger DAO attack last November and December—during which an attacker stole about $121 million from users—is a good example of “ice phishing” on...
A Look at What to Expect in the Cybersecurity World in 2022
Some cybersecurity experts say that complex cybersecurity challenges are coming in 2022, with new types of supply chain-related attacks and attacks...
Attackers Exploit OMIGOD Flaw in Azure Despite Microsoft Fixes
Cybercriminals are targeting Linux-based servers running Microsoft’s Azure public cloud environment that are vulnerable to flaws after Microsoft...
Cloudflare Launches Public Bug Bounty Program
Cloudflare on Tuesday added a public bug bounty program, the vendor’s first such initiative since the cloud security company started its bug bounty...
7 Privacy Tips for Security Pros
Track the Data Tom Garrubba, a vice president at Shared Assessments, says privacy is specifically focused on what an organization is permitted to do...
Is Multicloud Ready to Become the Cornerstone of DevOps?
Today’s IT reality is distributed and heterogeneous, from the applications to the infrastructure they run on. Organizations are navigating how to...
Data Privacy: Experts Share How Far We’ve Come and How Far We Have to Go
Data Privacy Day occurs each year on January 28 and was created to raise awareness and promote privacy and data protection best practices. Data...
Data Privacy Week: Raising Awareness and Encouraging Compliance
Data Privacy Day is not just a day anymore. For the first time, it’s Data Privacy Week — a week-long effort to empower individuals and enterprises...