Stranger Things concept of the “Upside Down” is a useful way to think about the risks lurking in the software we all rely on.
According to the new analysis of 4,700 leading websites, 64% of third‑party applications now access sensitive data without ...
One Identity Manager 10.0 introduces security-driven capabilities for risk-based governance, identity threat detection and ...
SOC 2 Type II compliance demonstrates our unwavering commitment to protecting customer data through proven, operational ...
Airlock Digital, a leader in proactive application control and endpoint security, announced the release of The Total Economic ...
Sprocket Security today announced the appointment of Eric Sheridan as Chief Technology Officer (CTO). In this role, Sheridan ...
The agricultural equipment industry has long considered itself immune from cyber attacks. After all: farm equipment wasn’t Internet-connected and the software and protocols that it used were obscure.
A new study by the firm Interos found that many hardware components in a popular touchscreen voting machine used in the U.S. originate in China or Russia. Efforts by the federal government and ...
Add Home Depot to the list of companies who have been victimized as a result of a third party contractor or supplier. The home improvement giant said in a statement on Thursday that the criminals that ...
In-brief: German carmaker BMW used a ‘over the air’ wireless patch to close a security flaw that could have allowed hackers to unlock the doors of Rolls-Royce, Mini and BMW vehicles. Reuters reports ...
Vulnerabilities in the STARLINK telematics software used in late model passenger vehicles made by Subaru enabled two, independent security researchers to gain unrestricted access to millions of Subaru ...
In-brief: a Distributed Denial of Service (DDoS) attack resulted in the loss of heating to two buildings in the city of Lappeenranta in eastern Finland according to a report by local media, the latest ...