Compliance

China’s Data Privacy Law Poses Challenge for International Companies

Businesses that have spent the past three-plus years adapting to the European Union’s far-reaching data privacy law now have to decide how they will respond to a similar law in China that has been cri...

Top IT Asset Management Tools for Security

IT asset management (ITAM) used to be purely about inventorying what hardware and software assets were scattered about the enterprise. However, the needs of cybersecurity now require that they also of...

MITRE, CISA Reveal Dangerous Hardware & Software Vulnerabilities

It's been an active week for security vulnerabilities, with MITRE and the U.S. Cybersecurity & Infrastructure Agency (CISA) revealing hundreds of critical vulnerabilities. CISA ordered federal ...

SBOMs: Securing the Software Supply Chain

As threat actors aim at IT supply chains, enhanced cybersecurity has been the recent driving force for industry adoption of the Software Bill of Materials (SBOM) framework. With a simple list of c...

Apple Patches Vulnerabilities in iOS Exploited by Spyware

Apple continues to be haunted by spyware developed by an Israeli security firm that hostile governments used to hack into Apple devices to spy on journalists, activists and world leaders (see Apple Se...

Best Third-Party Risk Management (TPRM) Tools of 2021

Cyberattacks caused by supply chain vulnerabilities mean organizations need a renewed perspective on how to address third-party security. In a developing market, third-party risk management (TPRM)...

Best Digital Forensics Tools & Software for 2021

For everything from minor network infractions to devastating cyberattacks and data privacy troubles, digital forensics software can help clean up the mess and get to the root of what happened. Sin...

Homomorphic Encryption Makes Real-World Gains, Pushed by Google, IBM, Microsoft

The increasing mobility of data, as it ping-pongs between clouds, data centers and the edge, has made it an easier target of cybercrime groups, which has put a premium on the encryption of that data i...

Huawei and the Critical Need for Global Cybersecurity Cooperation

Huawei is understandably frustrated. The company has been accused by the U.S., UK and others of improper ties to the Chinese government and punished without any proof of wrongdoing. The company has do...

White House to Corporate America: Take Ransomware Threat Seriously

The National Security Council is sending a memo to U.S. companies urging them to take the ransomware threat more seriously as the Biden Administration ramps up its responses following recent attacks l...

Latest articles

Top Cybersecurity Account...

AT&T Looks to Shut D...

Nation-State Attackers Us...

Fortinet vs Palo Alto Net...