AuthorEricka Chickowski, Contributing Writer
Security pros say the Log4j vulnerability is another warning call for enterprises to get more disciplined when keeping track of software bills of materials.
The details on cybersecurity technologies that we expect to advance rapidly in the coming year.
Check out our list of gifts with a big impact for hackers and other techie security professionals.
Security experts weigh in on the value and pitfalls of extended detection and response (XDR), offering consideration and advice on this growing new category.
The latest facts and figures on the state of software supply chain security in the enterprise.
Obfuscation techniques are extremely prevalent, data shows, but they can't be used as a single indicator of compromise because legitimate websites use them.
Theft of intellectual property, sabotage, exposure of sensitive data and more were caused by malicious behavior and negligence at these organizations