It’s often assumed that if the board knew exactly what they wanted to hear from the CISO, they would simply communicate it. Unfortunately, that’s not always...
The United States announced charges today against Maxim Rudometov, a Russian national, for being the suspected developer and administrator of the RedLine malware operation, one of...
Oct 29, 2024Ravie LakshmananAI Security / Vulnerability A little over three dozen security vulnerabilities have been disclosed in various open-source artificial intelligence (AI) and machine learning...
A few years back, my security team was tasked to create and maintain a green field environment for FEDRAMP compliance. We made a radical decision, we...
A report by Secureworks revealed a 30% year-over-year rise in active ransomware groups, which demonstrates fragmentation of an established criminal ecosystem. 31 new groups entered the...
After reports of an unauthorized, malicious actor gaining access to Cisco’s data and customer data, Cisco investigated the allegation and determined the impacted data was limited...
Sherlock Holmes is famous for his incredible ability to sort through mounds of information; he removes the irrelevant and exposes the hidden truth. His philosophy is...
“The existing tools enterprises have had have become insufficient because of the increased attack surface that has come from the migration of more IT functions to...
by Dan K. Anderson CEO, CISO, and vCISO The cybersecurity landscape is rapidly evolving, and so are the tactics of adversaries. According to IBM, the average...
Application programming interfaces (APIs) are growing in prominence. As APIs increase beyond the range of manual control, organizations may face greater security challenges. Here, we talk to Karl...