Vulnerability Management Challenges in IoT & OT Environments
By understanding the unique challenges of protecting IoT and OT devices, organizations can safeguard these critical assets against evolving cyber threats.
African Law Enforcement Nabs 1,000+ Cybercrime Suspects
Authorities across 19 African countries also dismantled their infrastructure and networks, thanks to cooperation between global law enforcement and private firms.
Compromised Software Code Poses New Systemic Risk to U.S. Critical Infrastructure
New Fortress Information Security research shows 90% of software products used by critical infrastructure organizations contain code developed in China.
CISA Issues Guidance to Telecom Sector on Salt Typhoon Threat
Individuals concerned about the privacy of their communications should consider using encrypted messaging apps and encrypted voice communications, CISA and FBI officials say.
Without validation, exposure management is just a half measure
As CTEM practices become increasingly widespread, security vendors have rushed to position themselves as exposure management providers — but a closer examination reveals that many of them have adopted a partial approach.
Parasitic advanced persistent threat Secret Blizzard accesses another APT's infrastructure and steals what it has stolen from South Asian government and military targets.