Content Paint

Security

Lessons for CISO success from a grizzled veteran

Never has a hacker been put off by an ISO certificate...

NIST reveals first four post-quantum cryptography algorithms

"Our post-quantum cryptography program has leveraged the top minds in cryptography worldwide."

NCSC and ICO issue stark warning on ransoms

"Criminalising ransom payments could shift the focus of criminality from the perpetrator to the victim."

Microsoft backtracks on change to block Office macros, despite security concerns

“To say I'm disappointed is an understatement."

US DoD bug bounty programme reopens after flood of submissions

"At ease, soldiers! The findings have been outstanding..."

Trust no-one: the challenge of implementing Zero Trust in legacy environments

Strong walls aren't enough to stop attackers, writes Guy Warren.

HackerOne says worker stole vulns for profit – fired employee blasts ‘baseless claims’

"We have terminated the employee, and bolstered our defenses to avoid similar situations."

New Open CVDB project puts cloud vulnerabilities in the spotlight

“There is currently no universal standard for cloud vulnerability enumeration..."

Mitel 0day being used as access point for ransomware

Crowdstrike-discovered vuln added to CISA's Known Exploited Vulnerabilities list.

Search the site

Your link has expired. Please request a new one.
Your link has expired. Please request a new one.
Your link has expired. Please request a new one.
Great! You've successfully signed up.
Great! You've successfully signed up.
Welcome back! You've successfully signed in.
Success! You now have access to additional content.