AuthZEN Aims to Harmonize Fractured Authorization Controls
Managing permissions and authorizations across dozens or hundreds of cloud services and platforms poses significant headaches for companies. An open specification aims to change that.
An executive order is targeting former Trump appointees, including former CISA director Chris Krebs and his current coworkers, in the latest in a series of directives against those who dissented against the president and his associates.
Security experts weigh in on the problem Salt Typhoon and its hacking of telecoms poses against the United States, including what the US should do and how defenders can protect themselves.
Open Source Poisoned Patches Infect Local Software
Malicious packages lurking on open source repositories like npm have become less effective, so cyberattackers are using a new strategy: offering "patches" for locally installed programs.
Cisco Industrial Security: Your blueprint for securing critical infrastructure
The updated Cisco Validated Design for industrial security is a comprehensive reference architecture to protect both plant networks and distributed infrastructure and deploy advanced OT security capabilities such as adaptive zone segmentation or zero...
The new SOAR playbook: How to choose the right automation platform for your security team
The Tines Essential SOAR Buyer’s Guide offers a practical, modern roadmap for evaluating and adopting next-gen SOAR platforms that go beyond alert triage to power secure, scalable automation across the enterprise.
Failing to distinguish between data privacy and data security leaves businesses vulnerable to regulatory scrutiny and the kinds of breaches that erode consumer trust overnight.