Sonatype, Snyk and Black Duck remained atop Forrester's software composition analysis rankings as commoditization of core ...
Cybersecurity researchers have discovered the first-ever UEFI bootkit designed to target Linux systems and subvert their boot ...
The U.S. Department of Defense is seeking industry proposals for a new artificial intelligence contract vehicle to help ...
Hugh Thompson, Executive Chairman and Program Chair, RSA Conference, and Managing Partner, Crosspoint Capital Partners The private equity firm that owns RSA Conference will invest $5 million into each ...
The role of the chief information security officer is evolving beyond a technical leadership position to a more strategic one. As cybersecurity threats grow in complexity, CISOs must work closely with ...
Robert Johnston, co-founder and CEO, Adlumin and John Pagliuca, president and CEO, N-able (Images: N-able) Buying Adlumin for up to $266 million will give MSPs the tools required to address the ...
On the 200th episode of the ISMG Editors' Panel, the team discussed the major China-linked cyberespionage campaign targeting U.S. telecommunications, highlighted key insights from ISMG's Financial ...
A view across Pyongyang to the Monument to Party Founding in a December 2018 photo (Image: Shutterstock) North Korean state actors are using fake websites of foreign technology service firms to ...
Every week, Information Security Media Group rounds up cybersecurity incidents and breaches around the world. This week, Russia suspected in Baltic Sea cable sabotage, ransomware attackers drawn to ...
The role of CISOs is evolving beyond a technical leadership position to a more strategic one. As cybersecurity threats grow in complexity, CISOs must work closely with business leaders to align ...
The absolute worst time to develop a breach response plan is directly after you have discovered a breach. The absolute best way to have your response team fail is to have them untrained on rarely ...
At the outset of the BYOD trend, mobile security was about protecting devices. Today, mature organizations are focused more on protecting data and ensuring proper identity and access management. See ...