Software Security: Too Little Vendor Accountability, Experts Say
Actual legislation is a long shot and a decade away, but policy experts are looking to jump-start the conversation around greater legal liability for insecure software products.
Hacker Sentenced After Years of Extorting Psychotherapy Patients
Two years after a warrant went out for his arrest, Aleksanteri Kivimäki finally has been found guilty of thousands of counts of aggravated attempted blackmail, among other charges.
Setting the Standard: Cisco Catalyst switches among the first to achieve ENERGY STAR certification
Three Cisco Catalyst switches — C9200-L, C9300-48P, and C9300-48UXM — are now officially ENERGY STAR® certified by the U.S. Environmental Protection Agency. This certification is yet another step in Cisco's sustainability journey, which we've been...
Continuous threat exposure management (CTEM): What it is and how to achieve it
How continuous threat exposure management (CTEM) discovers, prioritizes, and validates potential risks and aligns remediation with business goals and compliance frameworks.
Scans Probing for LB-Link and Vinga WR-AC1200 routers CVE-2023-24796, (Thu, May 2nd)
Before diving into the vulnerability, a bit about the affected devices. LB-Link, the make of the devices affected by this vulnerability, produces various wireless equipment that is sometimes sold under different brands and labels. This will make it...