The vulnerability affects not only Java-based applications and services that use the library directly, but also many other popular Java components and development frameworks that rely on it.| CSO Online
What network and website security issues should firms be looking at to ensure their sensitive information is fully protected from data breaches?| BlackFog
The weak link in your enterprise security might lie with partners and suppliers. Here’s how to understand and mitigate that risk.| CSO Online
Concentric AI offers a robust solution to the data sprawl challenge through its data discovery and classification solution.| Concentric AI
n this post, we define supply chain security and discuss some common challenges organizations face and best practices for ensuring supply chain security.| blog.codacy.com
In late 2018, the Marriott hotel chain announced that one of its reservation systems had been compromised, with hundreds of millions of customer records, including credit card and passport numbers, being exfiltrated by the attackers. Many of the details remain undisclosed, but this cyberattack is a cautionary tale about IT security, mergers and acquisitions, and Chinese espionage.| CSO Online
Data breaches affecting millions of users are far too common. Here are some of the biggest, baddest breaches in recent memory.| CSO Online