• Sun. May 10th, 2026

Christina Antonelli

Connecting the World, Technology in Time

Information Security

  • Home
  • When Cyber Security Breaches Are Inevitable, It’s Time To Call For A New Approach

When Cyber Security Breaches Are Inevitable, It’s Time To Call For A New Approach

We need to do more than deflect cyberattacks: we need to build the capacity to sustain business … operations during and after a cyberattack. getty At the TED Conference in…

Tech stack uniformity has become a systemic vulnerability

Crashes due to faulty updates are nothing new; in fact, one reason IT teams often delay updates is their unreliability and tendency to disrupt the organization’s day-to-day operations. Zero-days are…

Oktane 2024: Security BEGINS with identity

Securing identities has grown increasingly complex, with cybercriminals using advanced phishing, social engineering, and smishing techniques to bypass traditional controls. To stay ahead of these evolving threats, security practitioners need…

Patch Alert Issued for Veeam Backup & Replication Software

Governance & Risk Management , Patch Management Expect Ransomware Groups to Abuse Critical-Severity Bug to Steal Data, Experts Warn Mathew J. Schwartz (euroinfosec) • September 9, 2024 A flaw in…

ONCD releases request for information: Open-source software security

Open-source software is a collective partnership across the development community that requires both private and public buy-in. However, securing open-source software can be tricky. With so many different people working…

One More Tool Will Do It? Reflecting on the CrowdStrike Fallout

Sep 09, 2024The Hacker NewsData Protection / Threat Detection The proliferation of cybersecurity tools has created an illusion of security. Organizations often believe that by deploying a firewall, antivirus software,…