
GUEST ESSAY: Caring criminals — why some ransomware gangs now avoid targeting hospitals
Ransomware is a significant threat to businesses worldwide. There are many gangs that work together to orchestrate increasingly damaging attacks. However, some of these groups follow codes of conduct that prevent them ...

Black Hat Fireside Chat: Flexxon introduces hardened SSD drives as a last line defense
Creating ever smarter security software to defend embattled company networks pretty much sums up the cybersecurity industry. Related: The security role of semiconductors Cutting against the grain, Flexxon, a Singapore-based supplier of ...

News alert: Omdia finds risk-based vulnerability management set to encompass the VM market
LONDON, Sept. 18, 2023 – The first comparative research into the evolution of the vulnerability management market authored by Omdia has found risk-based vulnerability management (RVBM) is set to encompass the entire vulnerability management market ...

GUEST ESSAY: The timing is ripe to instill trust in the open Internet — and why this must get done
In today’s digital age, trust has become a cornerstone of building a better Internet. Preserving privacy for a greater good The Internet was designed as a platform for peer research, not for ...

Black Hat Fireside Chat: The impactful role crowdsourced security intelligence must play
From Kickstarter to Wikipedia, crowdsourcing has become a part of everyday life. Sharing intel for a greater good Now one distinctive type of crowdsourcing — ethical hacking – is positioned to become ...

News Alert: Traceable AI report exposes true scale of API-related data breaches, top challenges
San Francisco, Calif. —Traceable AI, the industry’s leading API security company, today released its comprehensive research report – the 2023 State of API Security: A Global Study on the Reality of API Risk. Despite ...

GUEST ESSAY: Robust data management can prevent theft, guard intellectual property
In an era of global economic uncertainty, fraud levels tend to surge, bringing to light the critical issue of intellectual property (IP) theft. Related: Neutralizing insider threats This pervasive problem extends beyond ...

GUEST ESSAY: Securing your cryptocurrency — best practices for Bitcoin wallet security
Over time, Bitcoin has become the most widely used cryptocurrency in the world. Strong security measures become increasingly important as more people use this digital currency. Related: Currency exchange security issues For ...

News Alert: Reflectiz declares war on Magecart web-skimming attacks as holidays approach
Tel Aviv, Israel, Sept. 5, 2023 — Reflectiz, a cybersecurity company specializing in continuous web threat management offers an exclusive, fully remote solution to battle Magecart web-skimming attacks, a popular type of ...

STEPS FORWARD: Regulators are on the move to set much needed IoT security rules of the road
New government rules coupled with industry standards meant to give formal shape to the Internet of Things (IoT) are rapidly quickening around the globe. Related: The need for supply chain security This ...