AuthorEricka Chickowski, Contributing Writer

Log4j Highlights Need for Better Handle on Software Dependencies

Security pros say the Log4j vulnerability is another warning call for enterprises to get more disciplined when keeping track of software bills of materials.

6 Security-Tech Innovations We’re Excited to See in 2022

The details on cybersecurity technologies that we expect to advance rapidly in the coming year.

10 Stocking Stuffers for Security Geeks

Check out our list of gifts with a big impact for hackers and other techie security professionals.

Is XDR Overhyped?

Security experts weigh in on the value and pitfalls of extended detection and response (XDR), offering consideration and advice on this growing new category.

6 Eye-Opening Statistics About Software Supply Chain Security

The latest facts and figures on the state of software supply chain security in the enterprise.

JavaScript Packing Found In More Than 25% of Malicious Sites

Obfuscation techniques are extremely prevalent, data shows, but they can't be used as a single indicator of compromise because legitimate websites use them.

10 Recent Examples of How Insider Threats Can Cause Big Breaches and Damage

Theft of intellectual property, sabotage, exposure of sensitive data and more were caused by malicious behavior and negligence at these organizations

© 2022 Camel Larry

Theme by Anders NorénUp ↑