Security
Headlines
HeadlinesLatestCVEs

Source

DARKReading

The Modern Software Supply Chain: How It's Evolved and What to Prepare For

Supply chain security attacks have been becoming increasingly common and more sophisticated. Find out how to remain secure throughout the software supply chain.

DARKReading
#vulnerability#linux#git#auth#ssh
Incognia Introduces New Location-Based Device Authorization Solution

Module enables apps to establish trust in new devices without adding user friction.

Lightspin Secures Infrastructure as Code Files with New GitHub Integration

Users can scan GitHub repositories and detect misconfigurations, exposed secrets and other security issues.

How Russia Is Isolating Its Own Cybercriminals

Sanctions imposed by the Biden administration, coupled with Russia's proposed initiative to cut itself off from the global Internet, is causing cybercriminals to ponder their future.

Backward-Compatible Post-Quantum Communications Is a Matter of National Security

When a quantum computer can decipher the asymmetric encryption protecting our vital systems, Q-Day will arrive.

From Passive Recovery to Active Readiness

This is the shift that companies need to make after a cyberattack.

Fortress Tackles Supply Chain Security, One Asset at a Time

Fortress Information Security will expand its Asset to Vendor Library to include hardware bill of materials and software bill of materials information.

Microsoft Launches Purview Platform to Govern, Protect, and Manage Sensitive Data

The rebranded Microsoft Purview platform integrates Microsoft 365 Compliance and Azure Purview, and adds new capabilities and products to help manage data no matter where it resides.

Millions of Lenovo Laptops Contain Firmware-Level Vulnerabilities

Three flaws present in consumer laptops can give attackers a way to drop highly persistent malware capable of evading methods to remove it, security vendor says.

More Than Half of Initial Infections in Cyberattacks Come Via Exploits, Supply Chain Compromises

Mandiant data also shows a dramatic drop in attacker dwell time on victim networks in the Asia-Pacific region — to 21 days in 2021 from 76 days in 2020.