Cybersecurity News
CYBER Rules: DOD’s DFARS and CMMC Explained
Cybersecurity expert Rob Knake informally interviews top cybersecurity lawyer Evan Wolff regarding an important change to the Cyber Maturity Model Certification (CMMC).On November 30th, the Department of Defense (DOD) Defense Federal Acquisition ...
Cybersecurity Issues Abound During the COVID-19 Pandemic
Hackers around the world are taking advantage of the rapid, widespread changes in the workforce and people’s personal online activity due to the ...
Cybersecurity Issues Abound During the COVID-19 Pandemic
Hackers around the world are taking advantage of the rapid, widespread changes in the workforce and people’s personal online activity due to the pandemic. Widespread, mandatory work-from-home policies have led to an ...
Nine Network Security Topics Grabbing Headlines in Q1 2020
The security landscape is getting more complex as threats like IoT device attacks, fileless malware, and non-email phishing attacks continue to rise. The ...
Nine Network Security Topics Grabbing Headlines in Q1 2020
The security landscape is getting more complex as threats like IoT device attacks, fileless malware, and non-email phishing attacks continue to rise. The cost of failing to protect against these attacks has ...
RSA 2020 Conference Recap: 7 Conference Observations from the Floor
RSA 2020 wrapped up last week in San Francisco, and once again, the show floor was buzzing with innovation and swag. While it’s ...
RSA 2020 Conference Recap: 7 Conference Observations from the Floor
RSA 2020 wrapped up last week in San Francisco, and once again, the show floor was buzzing with innovation and swag. While it’s impossible to capture all the sights and sounds of ...
Why is iOS 12 a top choice for app developers when it comes to security
When it comes to mobile operating systems, iOS 12 is generally considered to be one of the most secure — if not the leader — in mobile security. It’s now a little ...
Businesses are confident in their cybersecurity efforts, but weaknesses prevail
Today, maintaining data integrity and network security is a primary challenge for businesses everywhere. The scale of the threats they face is enormous. Those that succeed go unheralded. Those that fail end ...
Researchers find a new Linux vulnerability that allows attackers to sniff or hijack VPN connections
On Wednesday, security researchers from the University of New Mexico disclosed a vulnerability impacting most Linux distributions and Unix-like operating systems including FreeBSD, OpenBSD, macOS, iOS, and Android. This Linux vulnerability can ...

