When Cyber Security Breaches Are Inevitable, It’s Time To Call For A New Approach
We need to do more than deflect cyberattacks: we need to build the capacity to sustain business … operations during and after a cyberattack. getty At the TED Conference in…
Oktane 2024: Security BEGINS with identity
Securing identities has grown increasingly complex, with cybercriminals using advanced phishing, social engineering, and smishing techniques to bypass traditional controls. To stay ahead of these evolving threats, security practitioners need…
ONCD releases request for information: Open-source software security
Open-source software is a collective partnership across the development community that requires both private and public buy-in. However, securing open-source software can be tricky. With so many different people working…
the inevitable threat to information security
In an era where technological advancements continually reshape our world, one of the most significant emerging threats is quantum computing. This powerful technology, while promising revolutionary benefits, poses a substantial…
Security camera firm Verkada fined US$2.9m for CAN-SPAM violations
The US-based firm was also ordered to take action following security breaches in 2020 and 2021 that led to the exposure of sensitive security camera footage from hospitals and prisons.…
Explaining The OWASP API Security Top 10
Any company that employs APIs can tell you that they’re the glue that holds all things together, the hub that simplifies and scales digital growth. However, not all can tell…