A novel threat group, utilizing new malware, is out in the wild. But the who, what, where, and why are...
Dark Reading
Dark Reading
Cybercriminals and hacktivists have joined state-backed actors in using sabotage-bent malware in destructive attacks, new report shows.
Security Pro File: The old-school hacker traces a path from young hardware tinkerer to senior cybersecurity executive.
Eliminate passwords in user authentication workflow with Vault Vision's passkey features like facial recognition, fingerprint and pin verification on all...
As a data security solution focused solely on SaaS ecosystems, Metomic will use the Series A funding round to expand...
Before adopting SaaS apps, companies should set security guardrails to vet new vendors and check security integration for misconfiguration risks.
(ISC)2 members and cybersecurity professionals worldwide are encouraged to share their expertise, best practices and experiences with their peers and...
CloudNativeSecurityCon North America 2023 was a vendor-neutral cloud-native security conference. Here's why it was important.
Sharing attestations on software supply chain data that are formed into a policy will give us a framework to interpret...