Multi-factor authentication to be mandatory on Google Cloud accounts Jordyn Alger November 11, 2024 Google announced mandatory multi-factor authentication (MFA) is coming to Google Cloud accounts. Security leaders discuss the implications. Read More
Malicious actors are exploiting DocuSign to send fake invoices Jordyn Alger November 8, 2024 A new report reveals that malicious actors are exploiting APIs in DocuSign to send fake invoices. Read More
500,000 people impacted by ransomware attack on Columbus, Ohio Jordyn Alger November 7, 2024 The City of Columbus, Ohio, has notified 500,000 individuals that a ransomware attack in July 2024 stole their personal information. Read More
Benchmark Leader Profile: Archer Daniels Midland Co. Security and business continuity Jordyn Alger November 6, 2024 Brian Howell, Vice President, Global Head of Security at ADM, discusses the company's approach to security and business continuity.Read More
Global operation EMERALDWHALE steals 15K cloud credentials Jordyn Alger October 31, 2024 A global operation called EMERALDWHALE has resulted in the theft of more than 15,000 cloud service credentials. Read More
Software and IT vendors linked to 67% of energy sector breaches Jordyn Alger October 30, 2024 Two-thirds (67%) of third-party energy sector breaches were caused by software and IT vendors. Read More
Security leaders discuss the Cisco security incident Jordyn Alger October 29, 2024 Security leaders discuss the recent Cisco security incident. Read More
5 Minutes With How organizations can defend against the increasing API attack surface Jordyn Alger October 29, 2024 As APIs increase beyond the range of manual control, organizations may face greater security challenges.Read More
67% of organizations say employees lack basic security awareness Jordyn Alger October 24, 2024 67% of organizations are concerned that employees lack fundamental security awareness. Read More
New macOS vulnerability allows unauthorized data access Jordyn Alger October 24, 2024 A new macOS vulnerability could allow a malicious actor to evade an operating system’s Transparency, Consent, and Control (TCC) technology. Read More