Why did so many security vendors abandon MITRE’s stresstest?
This year, MITRE made headlines primarily because its leading vulnerability database was in danger of being d...
This year, MITRE made headlines primarily because its leading vulnerability database was in danger of being d...
Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Palo Alto Networks warns of a major vulnerability in its PAN-OS operating system. The OS is included in the s...
Researchers at the Technical University of Berlin discovered serious security risks in IoT applications on 5G...
Google plans to make the Kernel Flaws custom through 'Experimental Mitigations' that could make it difficult ...
Codean secured a €400,000 European grant for the further development of its security product. The Dutch sec...
SentinelOne recently introduced XDR Ingest. The data platform provides companies with an alternative to tradi...
Intel introduced a new chip security technology at the Black Hat conference. Tunable Replica Circuit (TRC) sh...
Container security firm Sysdig introduced ML-powered cloud detection to help businesses deal with cryptojacki...
Google added an extra security layer to Workspace. The new functionality monitors accounts at risk of being h...
Cisco was hit by a cyberattack in late May. The attackers captured network data. The incident involved an ini...
The ÆPIC leak CPU bug spills users' sensitive and confidential data in seconds from Intel SGX enclaves. I...