The Linux Foundation’s Core Infrastructure Initiative (CII) and the Laboratory for Innovation Science at Harvard (LISH), announced the release of ‘Vulnerabilities in the Core,’ a Preliminary Report and Census II of Open Source Software.`
62% of CISOs think the global cybersecurity talent shortage will get worse over the next five years, according to Global Snapshot: The CISO in 2020, a report that explores the role and demographics of CISOs.
It is clear that security and mobility go hand-in-hand, and that to continue to reap the benefits of workplace mobility, potential IT risks must be first addressed.
New research published by the Massachusetts Institute of Technology uncovered security vulnerabilities in a mobile voting application that was used during the 2018 midterm elections in West Virginia.
Rutter's, a chain of convenience stores and gas stations with 72 locations in Central Pennsylvania, West Virginia, and Maryland, has provided a notice to its customers of a data breach incident.
The Department of Homeland Security (DHS), the Federal Bureau of Investigation (FBI), and the Department of Defense (DoD) identified Trojan malware variants used by the North Korean government.
Our personal and business lives have been forever transformed to the digital age, and has significantly and forever redefined business risk. But it also creates entirely new business opportunities that demand responsive business models.