At Seceon’s 2024 Innovation and Certification Days, we had the privilege of showcasing one of the strongest partnerships in the cybersecurity landscape today—our collaboration with Exertis, a leading ...
A report finds a third (33%) of the cloud security incidents investigated by IBM Security X-Force researchers, involved phishing attacks to steal credentials, followed closely by 28% of incidents that ...
A Proclamation on Indigenous Peoples’ Day, 2021 Since time immemorial, American Indians, Alaska Natives, and Native Hawaiians ...
As global markets become more interconnected and businesses strive for agility and cost-efficiency, outsourcing software development has become a strategic choice for companies worldwide. The...Read ...
What is the KCDPA? The Kentucky Consumer Data Protection Act (KCDPA) is a state-level privacy law designed to safeguard the personal information of Kentucky residents. Like other state privacy ...
The malware has been circulating since at least 2021. It gets installed by exploiting more than 20,000 common misconfigurations, a capability that may make millions of machines connected to the ...
In the milestone 350th episode of the Shared Security Podcast, the hosts reflect on 15 years of podcasting, and the podcast’s evolution from its beginnings in 2009. They discuss the impact of a ...
Bad actors often take advantage of natural disasters, and especially hurricanes, in times of crisis. Hurricanes Helene and ...
One of the biggest dilemmas for security teams is when to patch vulnerabilities. This is a classic “Patch-22” ...
Enterprise organizations in recent years have come to recognize that attacks targeting software supply chains are a major ...
On July 10, 2024, Palo Alto released a security advisory for CVE-2024-5910, a vulnerability which allowed attackers to ...
At CornCon 2024, experts debunk myths, explore SaaS vulnerabilities, and highlight how human connections shape the future of ...