News
    July 2, 2022

    TikTok Assures U.S. Lawmakers it’s Working to Safeguard User Data From Chinese Staff

    Following heightened worries that U.S. users’ data had been accessed by TikTok engineers in China…
    Articles
    July 2, 2022

    7 technology white papers to read right now 2022; technology white papers

    Are you in charge of leading change? Drive sustainable infrastructure development at speed and scale…
    Articles
    July 2, 2022

    Never-fail best practices when hiring a security researcher 2022

    Micki Boland is a global cyber security warrior and evangelist with Check Point Technologies’ Office…
    News
    July 1, 2022

    2022 RSAC takeaways: Risk management vs compliance

    I attended the 2022 RSA Conference (RSAC) last month and am pleased to see that…
    News
    July 1, 2022

    Google Improves Its Password Manager to Boost Security Across All Platforms

    Google on Thursday announced a slew of improvements to its password manager service aimed at…
      News
      July 1, 2022

      Solving the indirect vulnerability enigma – fixing indirect vulnerabilities without breaking your dependency tree

      Fixing indirect vulnerabilities is one of those complex, tedious and, quite frankly, boring tasks that no one really wants to…
      News
      July 1, 2022

      Amazon Quietly Patches ‘High Severity’ Vulnerability in Android Photos App

      Amazon, in December 2021, patched a high severity vulnerability affecting its Photos app for Android that could have been exploited…
      News
      July 1, 2022

      Microsoft Warns of Cryptomining Malware Campaign Targeting Linux Servers

      A cloud threat actor group tracked as 8220 has updated its malware toolset to breach Linux servers with the goal…
      News
      July 1, 2022

      Women in Security 2022: Diana Pan, The Museum of Modern Art (MoMA)

      Special Report / Women in Security 2022
      Back to top button