News
The NIS2 Directive, which builds upon the original Network and Information Systems (NIS) Directive, aims to enhance the cybersecurity posture of critical sectors across the European Union. The ...
Throughout 2024, the landscape shifted dramatically: GitHub surged to the top of the most abused cloud services with 15%. This overtook Microsoft OneDrive, which fell to second place at 10%, followed ...
A “red teaming” exercise conducted in March by IT security consultancy Cyberis discovered that privileged access to One Login ...
Selected U.S. Privacy & Cyber Updates - DOJ Settles False Claims Act Case with MORSECORP over Cybersecurity Program - On March 26, 2025, the ...
Increasingly skeptical of higher education, students today need digital experiences and services, flexibility, ...
The rise of AI demands a new set of goals and strategies for CISOs, who must put appropriate parameters around the use of AI ...
According to Gartner’s Magic Quadrant, Check Point is the leader in email security platforms. Today email is still ...
The digital landscape that underpins modern life is rapidly evolving and outpacing efforts to keep cyber systems safe, secure ...
The biggest security failures rarely stem from cutting-edge attacks. They happen because of mundane, preventable errors.
Despite the vast array of cybersecurity tools available, many CISOs still struggle to gain a clear and comprehensive picture ...
CENTRAL POINT, Ore. - Central Point School District 6 is addressing a cybersecurity incident that impacted its digital ...
Experts say the European Vulnerability Database, or EUVD, should be a good resource, but only if ENISA manages to maintain it properly.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results