Security
Headlines
HeadlinesLatestCVEs

Source

DARKReading

Valeo Networks Acquires On Time Tech, Accelerating National Growth Strategy

Through this latest acquisition, the company adds two more California locations.

DARKReading
#ddos
Could Cyber Diplomacy Be the Ultimate Answer to American Ransomware Woes?

Incentives for good conduct and deterrents for bad behavior in cyberspace are impossible to effectively establish and enforce without international collaboration and commitment.

3 Ways to Deal With the Trojan Source Attack

These scripts and commands can be used to block the Trojan Source attack.

SecureAuth Buys Acceptto to Deliver Low-Friction Authentication to Enterprises

Acceptto’s contextual behavior threat intelligence technology will help SecureAuth deliver AI-driven MFA and continuous password-less authentication, SecureAuth says.

3 Ways to Deal With the Trojan Source Attack

These scripts and commands provide short-term fixes for blocking the Trojan Source attack that abuses Unicode to inject malicious backdoors int source code.

US Defense Contractor Discloses Data Breach

Electronic Warfare Associates says an attackers infiltrated EWA email in August, which led to the exfiltration of files with personal data.

Who's Minding Your Company's Crypto Decisions?

Security teams must first evaluate security protocols and the reputation of the cryptocurrency payment platform before their companies can proceed to accept the alternative currency as payment.

How InfoSec Should Use the Minimum Viable Secure Product Checklist

Google and Salesforce executives discuss the need for the newly released MVSP, how tech companies came together to work on it, and how organizations should use it.

To Secure DevOps, Security Teams Must be Agile

The evolution of agile development and infrastructure-as-code has given security teams the tools they need to gain visibility, find vulnerabilities early, and continuously evaluate infrastructure.

4 Tips on How Small to Midsize Businesses Can Combat Cyberattacks

The first step in improving your cybersecurity is understanding your risk of attack.