IoT security assessments expose diverse technologies, use cases, and protocols. While wireless components like WiFi and ...
Learn how to overcome C-suite resistance to investing in workplace violence prevention programs — keeping your business safe ...
When we think about HIPAA compliance and websites, the focus often shifts to patient portals, online scheduling systems, and ...
An unknown hacker called MUT-1244 used information-stealing malware to not only grab sensitive data from cybersecurity professionals but also to steal WordPress credentials from other bad actors who ...
Secure the workplace of today by exploring how to address BYOD vulnerabilities Bring Your Own Device (BYOD) policies have become commonplace in many workplaces. Employees use personal smartphones, ...
In this episode, Paul Asadoorian, Alec Summers, and Lisa Olson discuss the 25th anniversary of the CVE program, its evolution, and the importance of transparency in vulnerability management. They ...
What happens when passion, talent, and opportunity collide in the university’s tech scene? Meet David Nathanson and Daniel Garay, the freshmen duo who took the University of Richmond’s Capture the ...
Leon is the VP for Product Management at ThreatQuotient. He is passionate about information security as well as building cutting edge products which address customer requirements. Prior to joining ...
Warsaw, Poland, is the Founder and CEO of Mainsoft LLC, a company that specializes in premium web and mobile product development, from ideation and strategy to engineering, launch, and support. With a ...
By focusing on prioritized, actionable insights, security teams can keep pace with the rapid expansion of the attack surface, manage frequent changes across their digital infrastructure and ...
At Thales and Imperva, we are driven by our commitment to make the world safer, and nothing brings us more satisfaction than ...
The recent massive telecom hack by the Chinese state-sponsored group Salt Typhoon has highlighted critical vulnerabilities in ...