Source
DARKReading
Encrypted backups for several GoTo remote work tools were exfiltrated from LastPass, along with encryption keys.
Don't make perfect the enemy of good in vulnerability management. Context is key — prioritize vulnerabilities that are actually exploitable. Act quickly if the vulnerability is on a potential attack path to a critical asset.
The DPRK has turned crypto scams into big business to replenish its depleted state coffers.
Some predictions about impending security challenges, with a few tips for proactively addressing them.
Despite economic headwinds and layoffs in other areas, most retail and hospitality CISOs expect to add staff in 2023, according to a new report.
Report identifies 1.75m cyberattacks were stopped by BlackBerry in the last 90 days.
If you or your company can't find good infosec candidates, consider changing up the qualifications to find more nontraditional talent.
Skyhawk Synthesis extends cloud security misconfiguration detection across multiple clouds, the company says — throwing cloud security posture management in for free.