Laden...
The day's top cybersecurity news and in-depth coverage
January 07, 2022
The Apache Log4j vulnerability has impacted organizations around the globe. Here is a timeline of the key events surrounding the Log4j exploit as they have unfolded. Read more â¶
Organizations face serious challenges on the road to innovation, including people, process, and technology obstacles, say IDG experts.
Hacks and data thefts, enabled by weak security, cover-ups or avoidable mistakes have cost these companies a total of nearly $1.3 billion and counting.
These Active Directory updates address critical privilege bypass and elevation vulnerabilities. Implement them now if you can.
Seeing opportunities in the mass move to remote work, cyberattackers are updating their tactics, compelling security leaders to respond. Experts make their predictions about threat reduction, compliance, supply chain management, security spending and more.
Here is what you need to know about exploit chain risks, use cases, and mitigation.
A password manager stores a userâs passwords and logins for various sites and apps and generates new, strong passwords, making it a valuable tool for implementing strong passwords in your business.
Keep up with news of CSO, CISO, and other senior security executive appointments.
© 2024