Security
Headlines
HeadlinesLatestCVEs

Source

DARKReading

Optiv Launches Cyber Recovery Solution Focused on Protection and Rapid Recovery

CMS helps minimize the impact a cyberattack has on business operations, finances and reputation.

DARKReading
#cisco
BigID Introduces Cloud Data Security On Demand

New SmallID offering brings cloud-native data privacy and protection to organizations of all sizes.

IBM to Buy Attack Surface-Management Firm Randori

Randori’s attack-surface management software will be integrated into IBM Security QRadar extended detection and response (XDR) features.

Cybersecurity M&A Activity Shows No Signs of Slowdown

But valuations have dropped — and investors are paying closer attention to revenues and profitability, industry analysts say.

The CISO Shortlist: Top Priorities at RSA 2022

The buzz on the show floor during RSA Conference is about aligning the organization's security priorities with the right technology. Will Lin, managing director and founding member at Forgepoint Capital, weighs in on the biggest security priorities for 2022 — and what kind of tech senior-level executives are looking for.

Are You Ready for a Breach in Your Organization's Slack Workspace?

A single compromised Slack account can easily be leveraged to deceive other users and gain additional access to other users and multiple Slack channels.

Name That Edge Toon: Hey, Batter Batter!

Come up with a clever caption, and our panel of experts will reward the winner with a $25 Amazon gift card.

Gathering Momentum: 3 Steps Forward to Expand SBoM Use

New studies show less than a third of organizations use software bills of materials (SBoMs), but momentum is building to boost that number.

FDA: Patch Illumina DNA Sequencing Instruments, Stat

A critical security bug could lead to remote device control, altered lab results, and more, putting patients in danger, agency warns.

YourCyanide Ransomware Propagates With PasteBin, Discord, Microsoft Links

The latest iteration of CMD-based ransomware is sophisticated and tricky to detect – and integrates token theft and worming capabilities into its feature set.