Nearly half of all companies surveyed in a report have delayed moving an application into production because of concerns over security of containers or Kubernetes.
The Linux Foundation’s Core Infrastructure Initiative (CII) and the Laboratory for Innovation Science at Harvard (LISH), announced the release of ‘Vulnerabilities in the Core,’ a Preliminary Report and Census II of Open Source Software.`
62% of CISOs think the global cybersecurity talent shortage will get worse over the next five years, according to Global Snapshot: The CISO in 2020, a report that explores the role and demographics of CISOs.
New research published by the Massachusetts Institute of Technology uncovered security vulnerabilities in a mobile voting application that was used during the 2018 midterm elections in West Virginia.
Rutter's, a chain of convenience stores and gas stations with 72 locations in Central Pennsylvania, West Virginia, and Maryland, has provided a notice to its customers of a data breach incident.
The Department of Homeland Security (DHS), the Federal Bureau of Investigation (FBI), and the Department of Defense (DoD) identified Trojan malware variants used by the North Korean government.
Internet-enabled crimes and scams show no signs of letting up, according to data released by the Federal Bureau of Investigation's (FBI) Internet Crime Complaint Center (IC3) in its 2019 Internet Crime Report.