Unveiling the Hidden Risks of Routing Protocols
Routing protocols play a critical role in the functioning of the Internet and the services built upon them. However, many of these protocols were developed Read More
Routing protocols play a critical role in the functioning of the Internet and the services built upon them. However, many of these protocols were developed Read More
Creating and deploying public key infrastructure is notoriously difficult. However, a group of encryption vendors, consultancies, and other experts aim to make a resilient approach Read More
Just two years after Cybersecurity and Infrastructure Security Agency (CISA) Director Jen Easterly unveiled the Joint Cyber Defense Collective (JCDC) initiative, a cooperative effort between Read More
Edge cloud platform provider Fastly has announced the general availability of Certainly, its publicly trusted Transport Layer Security (TLS) certificate authority (CA). Originally announced as Read More
The fast-rising Play ransomware group that targeted the City of Oakland earlier this year is now hitting managed service providers (MSPs) around the globe in Read More
This time, it’s the law firm that got breached, then sued for what victims claim was inadequate protection and compensation for theft of personal data.
With thousands of Citrix networking products vulnerable to a critical vulnerability still unpatched and exposed on the Internet, Mandiant has released a tool to help Read More
TEL AVIV, Israel, August 16, 2023 — Dig Security, the cloud data security leader, today released findings from its first-ever “State of Cloud Data Security 2023 Report.” The Read More
Fulton, MD, August 16, 2023 — DataTribe, a global cyber foundry that invests in and co-builds next-generation cybersecurity and data science companies, today opened its Read More
Microsoft’s PowerShell Gallery presents a software supply chain risk because of its relatively weak protections against attackers who want to upload malicious packages to the Read More