A new survey of business leaders in the U.S., U.K. and Germany found many major cyber incidents from the past few years went unnoticed by the majority of...
Category - Security
Researchers at the security vendor Bkav Corporation found a way to bypass iPhone X security by tricking Face ID, Apple’s facial recognition...
Microsoft released updates to close 53 vulnerabilities on November Patch Tuesday. But, of the 14 vulnerabilities that affect Windows Server, none have a...
Android users were tricked by a convincing fake WhatsApp app listing in the official Google Play Store, but one expert said this incident shouldn’t take...
Xerox CISO Alissa Johnson, known as Dr. Jay, is the former deputy CIO of the Executive Office of the President, where she managed cloud services...
Phyllis Schneck is a managing director at Promontory Financial Group, the regulatory consulting company IBM acquired in 2016. Schneck joined Promontory in...
Knocks on SOCs are not uncommon: Too many security operations centers are rudimentary, and organizations in almost all industries need to upgrade their...
Managing software vulnerabilities is a universal problem.
While unknown flaws in code or system design are part of the vulnerability management process...