Around the year 1900, an author (Rudyard Kipling) wrote a poem called “The Elephant’s Child.” In it, he writes: “I keep six ...
CISA in two years has seen the number of critical infrastructure organizations signing up for its CPG services double, which ...
Explore key trends in the BSIMM15 report, such as securing AI and the software supply chain, plus recommendations for ...
Around the year 1900, an author (Rudyard Kipling) wrote a poem called “The Elephant’s Child.” In it, he writes: “I keep six ...
Have you ever had your lunch interrupted by a sudden barrage of security alerts? That’s exactly what happened to one of our ...
Explore key trends in the BSIMM15 report, such as securing AI and the software supply chain, plus recommendations for enhancing your software security program.The post BSIMM15: New focus on securing ...
Fifteen Best Practices to Navigate the Data Sovereignty Waters - 08:04 Data sovereignty—the idea that data is subject to the ...
In this article, we touch on the trends and predictions that in the year 2025 and beyond will fashion cloud security.
With more than 20 years of IT experience, Nick Kathmann has spent the past 18+ years helping enterprises of all sizes strengthen their cybersecurity postures. He has built and led several teams ...
On January 7, we published a press release to share our five predictions for cybersecurity in 2025. Over the next few weeks, ...
A new ransomware group called FunkSec claimed 85 victims in December but its members appear to be lesser-skilled hackers using generative AI and inflated attack numbers to bolster their capabilities ...
The new rules come in the wake of the Change Healthcare breach, which exposed the electronic personal health information of about 100 million Americans.