Can’t Fill Open Positions? Rewrite Your Minimum Requirements
If you or your company can’t find good infosec candidates, consider changing up the qualifications to find more nontraditional …
If you or your company can’t find good infosec candidates, consider changing up the qualifications to find more nontraditional …
A coalition of cybersecurity industry associations have published an open letter urging the US Congress to delay Software Bill of Materials …
Nearly nine in 10 (87%) of US defense contractors are failing to meet basic cybersecurity regulation requirements, according to research …
“Logs from these services need to be enabled in all AWS Regions and accounts that are within scope. Logs should also be shipped to a …
New proposals to establish security and privacy requirements for app store operators and developers have been published today by the UK …
Posted by Krish Vitaldevara, Director, Product Management Google Play helps our developer community distribute the world’s most …
The goal for PCI DSS v4.0 is to “address emerging threats and technologies and enable innovative methods to combat new threats” to …
Instead of just testing for weaknesses, a more effective software security program prevents them. This requires a streamlined, automated …
I recently hopped on the Lookout podcast to talk about virtual private networks (VPNs) and how they’ve been extended beyond their original …
Upcoming changes in the law If you’re not a privacy geek you may not have noticed that California recently voted to change its two …
David Weston, Microsoft director of OS and enterprise security, spoke with CRN about the company’s controversial decisions with Windows 11. …
For pre-built systems, Windows 11 will ship with Virtualization-Based Security (VBS) enabled by default, and according to a new report from …
This directive comes from the Cybersecurity and Infrastructure Agency which advised the Transportation Security Administration “on …
On May 12, 2021, President Biden announced an executive order to improve the nation’s cybersecurity. The order, which outlines security …