Featured
DevSecOps: 4 Reasons You Need One
Those familiar with the world of software and application development are probably aware of the concept of DevOps. But what about DevSecOps? DevSecOps essentially adds another layer to the process by combining ...
FireEye Acquires Respond Software to Advance Cybersecurity AI
FireEye Inc., a provider of managed security services augmented by machine learning algorithms, has acquired Respond Software, a provider of a platform that automates security incident investigations, for $186 million. Peter Bailey, ...
Ransomware Increase Highlights Need for Better IT, OT Security
IT networks tend to get all the attention for cybersecurity, but operational technology (OT) and the supply chain are at increasing risk of cyberattacks. Manufacturing security needs to deploy a more holistic ...
Palo Alto Networks Surfaces AWS API Vulnerabilities
The Unit 42 research arm of Palo Alto Networks has published a report detailing how 22 application programming interfaces (APIs) across 16 different Amazon Web Services (AWS) platforms can be abused by ...
Congress Passes IoT Security Act, but is it Toothless?
The House and the Senate have both passed a bipartisan bill to shore up the security of “internet of things” devices ...
Sumo Logic Finds Attack Surface Expanding
An annual report published today by Sumo Logic, a provider of security tools delivered as a cloud service, highlights the degree to which security has fundamentally shifted in the age of the ...
Japanese Orgs Hacked ‘by China’ in Long, Widespread Campaign
Chinese state-backed threat actors APT10 have been hacking Japanese businesses for at least a year ...
Trump Fires DHS Cybersecurity Agency Over Election Remarks
Chris Krebs, director of the Cybersecurity and Infrastructure Security Agency (CISA), has been fired by President Trump. His crime? Making a “highly inaccurate” statement about the 2020 presidential election. CISA called the election ...
Hang up the Phone: MFA’s Insecure Reliance on SMS
It’s hard enough to get people to use multi-factor authentication (MFA)—you know, something you know, you have and you are. Most websites, email accounts and other devices are secured (if at all) ...
Vertafore Leak: Private Data of 28M Texans
An insurance software vendor ’fessed up to losing control of a huge cache of personal data. Vertafore lost the details of 27,700,000 Texas drivers ...

