Memory Corruption Issues Lead 2021 CWE Top 25

Memory Corruption Issues Lead 2021 CWE Top 25

Memory Corruption Issues Lead 2021 CWE Top 25 The MITRE Common Weakness Enumeration (CWE) team’s latest list of most dangerous software flaws includes several that shot up in significance since 2020. Memory corruption errors remain one of the most common and dangerous...
Watch for Cybersecurity Games at the Tokyo Olympics

Watch for Cybersecurity Games at the Tokyo Olympics

Watch for Cybersecurity Games at the Tokyo Olympics The cybersecurity professionals guarding the Summer Olympics are facing at least as much competition as the athletes, and their failure could have steeper ramifications. It was a close call, but the 2018 Pyeongchang...
The True Cost of a Ransomware Attack

The True Cost of a Ransomware Attack

The True Cost of a Ransomware Attack Companies need to prepare for the costs of an attack now, before they get attacked. Here’s a checklist to help. If anyone needed further proof that ransomware is one of the most important digital threats organizations currently...
Stopping threats in today’s threat landscape

Stopping threats in today’s threat landscape

Stopping threats in today’s threat landscape Many adversaries take advantage of new vulnerabilities and convert them into weaponized attacks, while extreme adversaries focus on supply chain and targeted attacks. The work from home (WFH) transition over this past year...

Pin It on Pinterest