A critical vulnerability affecting Ivanti Endpoint Manager Mobile (EPMM), tracked as CVE-2023-35082, has been added to CISA's Known Exploited Vulnerabilities (KEV) Catalog.The vulnerability has...
Software that prioritizes security at its most foundational level means designing the system with customer security as a key goal rather than a tacked-on...
COMMENTARYWhile distributed denial-of-service (DDoS) attacks and zero-day threats are nothing new in cybersecurity, they're still happening regularly for a simple reason: They work. In...
As innovation in artificial intelligence (AI) continues apace, 2024 will be a crucial time for organizations and governing bodies to establish security standards, protocols, and...
The festive season should be a time for celebration and relaxation. Instead, small and mid-sized enterprises (SMEs) must prepare for a sudden onslaught of...
Intellectual property theft is a major concern for all businesses, but especially organizations in the defense-industrial base because their IP is vital to national...
COMMENTARYIn December 2020, the SolarWinds attack sent shockwaves around the world. Attackers gained unauthorized access to SolarWinds' software development environment, injected malicious code into...