Business Operations | News, how-tos, features, reviews, and videos
The stolen trade secrets were critical to Google’s AI prowess, involving the specialized hardware and software that power the company’s supercomputing centers.
Every organization should run tabletop exercises that answer key questions about their preparedness for ransomware and DDoS attacks, third-party risks, and insider threats.
The US National Institute of Standards and Technology released the 2.0 version of its Cybersecurity Framework, focusing more on governance and supply chain issues and offering resources to speed the framework’s implementation.
Still a minority in the profession, female cybersecurity professionals can expand their career development and get support from their peers by joining women-only groups.
The SolarWinds court filing demands that SEC charges be dropped for lacking foundation, material proof, or scope of indictment.
Zero-day exploits, supply chain attacks fuel 72% increase over previous record for incidents of compromise. Another increase is expected for 2024.
The proof of concept shows it's possible to upload malicious PyTorch releases to GitHub by exploiting insecure misconfigurations in GitHub Actions.
Software suppliers and consumers alike will increasingly need to be familiar with global requirements and regulations designed to mitigate software supply chain attacks.
As the DOD's Cybersecurity Maturity Model Certification cyber rules for suppliers inch closer to finish line, some vendors see more realistic expectations for compliance.
Organizations might be at risk of liability for images containing malicious code they post on social media even if they were unaware of it.