FedRAMP Rev. 5: How Cloud Service Providers Can Prepare
This article covers high-level information that cloud service providers (CSPs) need to know to prepare for their transition to FedRAMP Rev. 5, as documented in Read More
This article covers high-level information that cloud service providers (CSPs) need to know to prepare for their transition to FedRAMP Rev. 5, as documented in Read More
US organizations that hire freelance and temporary IT workers should be sure they are not signing up individuals working on behalf of the North Korean Read More
Cybersecurity researchers have uncovered a connection between the notorious DarkGate remote access trojan (RAT) and the Vietnam-based financial cybercrime operation behind the Ducktail infostealer. WithSecure’s Read More
Whether they’re earned or not, there are certain stigmas associated with chief information security officers (CISOs): They work in isolation, with only a vague sense Read More
There is always a new shiny object to chase in cybersecurity: zero trust, AI, passwordless authentication, quantum computing. These are just some of the latest Read More
Users could hold up to five SIM cards previously, but now they can only have two; it’s a move that the government says is intended Read More
Imagine this: As part of an exercise to teach security awareness, employees enter a room. An actual, physical operational security “escape room,” which at first Read More
If we really want to move the dial on security habits, it’s time to think beyond phishing tests. Our panel of CISOs and other security Read More
Cisco said a patch for two actively exploited zero-day flaws in its IOS XE devices is scheduled to drop on Oct. 22. The first Cisco Read More
Eight newly discovered vulnerabilities in the SolarWinds Access Rights Manager Tool (ARM) — including three deemed to be of critical severity — could open the Read More