How do we protect against this changing enterprise application landscape? Organizations across the world need to lead the adoption of Zero Trust Architecture (ZTA) for cybersecurity as their first principle of implementation.
Hackers are entrepreneurs. After legitimate developers built software-as-a-service (SaaS) businesses by renting access to productivity software, cybercriminals seeking new revenue streams created malware-as-a-service (MaaS) as a dangerous alternative.
Canterbury Cathedral, one of the UK’s most important UNESCO Heritage sites, embarked on a seven-year program to install technology to preserve and safeguard the fifteen-centuries-old masterpiece of English Gothic architecture.
Pamela Fusco brings over 30 years of leading-edge, global enterprise security experience to the position with a career spanning both the public and private sectors.
To help mitigate cybersecurity risks to managed service provider customers, the Cybersecurity and Infrastructure Security Agency released a resource, providing a framework that government and private sector organizations outsourcing some level of IT support to MSPs can use to better mitigate against third-party risk.
Guardicore has discovered a new attack vector on Comcast’s XR11 voice remote that would have allowed attackers to turn it into a listening device – potentially invading your privacy in your living room.
Cyber company Rapid7 says it has found vulnerabilities in a Wi-Fi connected security system, saying the system has an unauthenticated API and an unencrypted radio signal that can be easily intercepted.