The day's top cybersecurity news and in-depth coverage
July 20, 2022
Microsoft's reversal of its blocking by default on Excel macros creates an opportunity to improve policies and processes around Excel and Office macro use. Read more â¶
Cloud cost management and continuous governance are foundational to a companyâs digital transformation and should be prioritized in every cloud journey. Ensure there are no hidden surprises in your cloud bill today.
At least one model of GPS tracking devices made by Chinese firm MiCODUS "lacks basic security protections needed to protect users from serious security issues."
The latest Consumer Identity and Breach Report from ForgeRock found that supply chain security breaches rose last year, with unauthorized access the leading infection vector.
The Center for Internet Security offers best practices for securing each phase of the software supply chain.
Cato SSE 360 provides a security service edge offering that includes DLP (data loss prevention) features based on customizable rules.
Testing your security policies and procedures in real-life scenarios can help you improve your security postureâif you implement the lessons learned.
With security professionals in short supply, it pays to ensure your job postings arenât turning away good candidates. Here are six things experts say to avoid and what to do instead.