Laden...
The day's top cybersecurity news and in-depth coverage
February 26, 2022
Two recent court cases expose the capabilities of publicly available spyware and how businesses and governments use them for malicious purposes. Read more â¶
âWe have better security success when the developers are taking part in it,â says James Chandler, VP of security for Western Governors University.
New research links the ShadowPad remote-access Trojan to China's Ministry of State Security and the People's Liberation Army.
Here's what IT and security admins for Microsoft networks need to know about recent changes to Office and Windows.
Low code does not mean low risk. By allowing more people in an enterprise to develop applications, low-code development creates new vulnerabilities and can hide problems from security.
NotPetya proved the effectiveness of an attack on the software supply chain, and attackers are targeting it more now. Here's advice to reduce risk to your DevOps processes.
The hot cybersecurity mergers and acquisition market continues into 2022 as vendors look to solidify their positions and expand their offerings.
© 2024