Hackers Claim To Steal Files From App Used by Trump Adviser Jordyn Alger May 7, 2025 Hackers have claimed to steal messages from TeleMessage, an app apparently used by Trump’s former national security adviser. Read More
The top 4 unmanaged apps are AI-driven Security Staff February 17, 2025 A recent Torii report analyzed how businesses are managing a rise in "shadow IT" and artificial intelligence (AI) driven tools. Read More
Application security and risk management in financial organizations Idan Plotnik January 8, 2025 Financial services companies are under pressure to deliver secure software faster like never before.Read More
Understanding the security risks of outdated software Jody Jankovsky November 5, 2024 Increasing software usage makes it harder for businesses to know what they have and where it’s located while aging apps are harder to patch and protect.Read More
5 Minutes With How organizations can defend against the increasing API attack surface Jordyn Alger October 29, 2024 As APIs increase beyond the range of manual control, organizations may face greater security challenges.Read More
New iPhone feature could expose employees’ personal information Jordyn Alger October 16, 2024 Cybersecurity researchers have discovered that Apple’s new “Mirroring” feature could expose an employee’s personal applications.Read More
How IT leaders can balance software needs with limited budgets Josh Mullis August 28, 2024 IT budget constraints are here to stay; thankfully, IT leaders can balance software needs with limited budgets. Read More
8 vulnerabilities found in macOS operating system Microsoft apps Jordyn Alger August 22, 2024 Researchers discovered 8 vulnerabilities in macOS operating system Microsoft apps, and security leaders are sharing their insights. Read More
Product Spotlight Product spotlight on cybersecurity Taelor Sutherland August 6, 2024 Security magazine highlights a variety of cybersecurity products to protect data and businesses.Read More
95% percent of organizations had at least one high or critical risk Security Staff July 18, 2024 A recent report found that many applications contained vulnerabilities spanning various stages of the kill-chain, leaving them vulnerable to attack.Read More