04Dec 2023
ICS at Multiple US Water Facilities Targeted by Hackers Affiliated With Iranian Government
04Dec 2023ICS at Multiple US Water Facilities Targeted by Hackers Affiliated With Iranian Government04 Dec 2023UncategorizedAdmin04Dec 2023ICS at Multiple US Water Facilities Targeted by Hackers Affiliated With Iranian Government04 Dec 2023UncategorizedAdmin04Dec 2023New Relic Says Hackers Accessed Internal Environment Using Stolen Credentials04 Dec 2023UncategorizedAdmin04Dec 2023Fortifying the bridge between tech and business in the C-suite04 Dec 2023UncategorizedAdmin04Dec […]
04Dec 2023
New Relic Says Hackers Accessed Internal Environment Using Stolen Credentials
04Dec 2023
Fortifying the bridge between tech and business in the C-suite
04Dec 2023
The CIO’s new role: Orchestrator-in-chief
04Dec 2023
Beyond gigabit: the need for 10 Gbps in business networks
03Dec 2023
Breaches by Iran-Affiliated Hackers Spanned Multiple U.S. States, Federal Agencies Say
01Dec 2023
Website spoofing: risks, threats, and mitigation strategies for CIOs
01Dec 2023
Congressmen Ask DOJ to Investigate Water Utility Hack, Warning It Could Happen Anywhere
01Dec 2023
Gain full visibility across the Internet Stack with IPM (Internet Performance Monitoring)
01Dec 2023
Staples Confirms ‘Cybersecurity Risk’ Disrupting Online Stores
01Dec 2023
How customers can save money during periods of economic uncertainty
01Dec 2023
In Other News: Utilities Targeted by Hackers, Aerospace Attacks, Killnet Leader Unmasked
01Dec 2023
New ‘Turtle’ macOS Ransomware Analyzed
01Dec 2023
US Sanctions North Korean Cyberespionage Group Kimsuky
01Dec 2023
10 business intelligence certifications and certificates to advance your BI career
01Dec 2023
LexisNexis rises to the generative AI challenge
01Dec 2023
Simple Attack Allowed Extraction of ChatGPT Training Data
30Nov 2023
Generative AI’s ‘show me the money’ moment
30Nov 2023
Apple Patches WebKit Flaws Exploited on Older iPhones
30Nov 2023
How customers capture real economic value with zero trust
30Nov 2023
Major Security Flaws in Zyxel Firewalls, Access Points, NAS Devices
30Nov 2023
Thinking of hibernating through the metaverse winter?
30Nov 2023
A cloud-based solution to rescue millions from energy poverty
30Nov 2023
Meta Takes Action Against Multiple Foreign Influence Campaigns
30Nov 2023
US Sanctions Cryptocurrency Mixer Sinbad for Aiding North Korean Hackers
30Nov 2023
Black Basta Ransomware Group Received Over $100 Million From 90 Victims
30Nov 2023
Qlik Sense Vulnerabilities Exploited in Ransomware Attacks
30Nov 2023
Dollar Tree Impacted by ZeroedIn Data Breach Affecting 2 Million Individuals
30Nov 2023
Palo Alto Networks Unveils New Rugged Firewall for Industrial Environments
30Nov 2023
CISA Debuts ‘Secure by Design’ Alert Series
30Nov 2023
Google’s RETVec Open Source Text Vectorizer Bolsters Malicious Email Detection
30Nov 2023
400G: Building bandwidth for the next lap
30Nov 2023
CIO Darlene Taylor’s formula for success: Listen, drive, care
30Nov 2023
8 change management questions every IT leader must answer
30Nov 2023
Hundreds of Malicious Android Apps Target Iranian Mobile Banking Users
29Nov 2023
Keyless Goes Independent, Raises $6M for Biometric Authentication
29Nov 2023
Okta Broadens Scope of Data Breach: All Customer Support Users Affected
29Nov 2023
New BLUFFS Bluetooth Attack Methods Can Have Large-Scale Impact: Researcher
29Nov 2023
Google Patches Seventh Chrome Zero-Day of 2023
29Nov 2023
CISA Warns of Unitronics PLC Exploitation Following Water Utility Hack
29Nov 2023
Five Cybersecurity Predictions for 2024
29Nov 2023
Google Will Start Deleting ‘Inactive’ Accounts in December. Here’s What You Need to Know
29Nov 2023
Per Scholas redefines IT hiring by diversifying the IT talent pipeline
29Nov 2023
Steps Gerresheimer takes to transform its IT
29Nov 2023
4 remedies to avoid cloud app migration headaches
28Nov 2023
The Importance of Identity Management in Security
28Nov 2023
The hybrid approach: Get the best of both mainframe and cloud
28Nov 2023
Why data virtualization is critical for business success
28Nov 2023
How to evolve IT systems into innovation engines
28Nov 2023
Dear Oracle Cloud…I need my own space
28Nov 2023
Exploitation of Critical ownCloud Vulnerability Begins
28Nov 2023
Police Dismantle Major Ukrainian Ransomware Operation
28Nov 2023
Amazon One Enterprise Enables Palm-Based Access to Physical Locations, Digital Assets
28Nov 2023
Los Angeles SIM Swapper Sentenced to 8 Years in Prison
28Nov 2023
Critical Vulnerability Found in Ray AI Framework
28Nov 2023
Making sense of zero trust – why a managed SASE solution is the ideal option for enterprises
28Nov 2023
What you don’t know about data management could kill your business
28Nov 2023
8 tips for unleashing the power of unstructured data
28Nov 2023
Ardent Hospitals Diverting Patients Following Ransomware Attack
28Nov 2023
Gen AI without the risks
27Nov 2023
Old age isn’t what is used to be: a versatile solution for a more independent breed of seniors
27Nov 2023
Critical ownCloud Flaws Lead to Sensitive Information Disclosure, Authentication Bypass
27Nov 2023
Henry Schein Again Restoring Systems After Ransomware Group Causes More Disruption
27Nov 2023
US, UK Cybersecurity Agencies Publish AI Development Guidance
27Nov 2023
UK, Korea Warn of DPRK Supply Chain Attacks Involving Zero-Day Flaws
27Nov 2023
Fidelity National Financial Takes Down Systems Following Cyberattack
27Nov 2023
Hacktivism: What’s in a Name… It May be More Than You Expect
27Nov 2023
Hackers Hijack Industrial Control System at US Water Utility
27Nov 2023
Turning the tide in STEM career roadblocks at Synchrony
27Nov 2023
10 things keeping IT leaders up at night
27Nov 2023
Pentagon’s AI Initiatives Accelerate Hard Decisions on Lethal Autonomous Weapons
25Nov 2023
Broadcom Planning to Complete Deal for $69 Billion Acquisition of VMWare After Regulators Give OK
24Nov 2023
North Korean Software Supply Chain Attack Hits North America, Asia
24Nov 2023
In Other News: National Laboratory Breach, Airplane GPS Attacks, Russia Accuses Allies of Hacking
24Nov 2023
Germany’s ITZBund is moving federal IT into the cloud
24Nov 2023
The 15 most valuable IT certifications today
23Nov 2023
A forensic look to modernize tech at South Africa’s SIU
23Nov 2023
What CIOs can learn from the massive Optus outage
22Nov 2023
Thrive with Digital, Accelerating Intelligence for Electric Power
22Nov 2023
How machines learned to chat
22Nov 2023
Researchers Discover Dangerous Exposure of Sensitive Kubernetes Secrets
22Nov 2023
185,000 Individuals Impacted by MOVEit Hack at Car Parts Giant AutoZone
22Nov 2023
Microsoft Offers Up to $20,000 for Vulnerabilities in Defender Products
22Nov 2023
Sam Altman is Back as OpenAI CEO Just Days After Being Removed, Along With a New Board
22Nov 2023
Windows Hello Fingerprint Authentication Bypassed on Popular Laptops
22Nov 2023
Kansas Officials Blame 5-Week Disruption of Court System on ‘Sophisticated Foreign Cyberattack’
22Nov 2023
Humans Are Notoriously Bad at Assessing Risk
22Nov 2023
Citrix, Gov Agencies Issue Fresh Warnings on CitrixBleed Vulnerability
22Nov 2023
5 pillars of a cloud-conscious culture
22Nov 2023
Keeping the customer journey and experience as a North Star
21Nov 2023
LLM Security Startup Lasso Emerges From Stealth Mode
21Nov 2023
CISA Offering Free Cybersecurity Services to Non-Federal Critical Infrastructure Entities
21Nov 2023
Tor Network Removes Risky Relays Associated With Cryptocurrency Scheme
21Nov 2023
Canadian Military, Police Impacted by Data Breach at Moving Companies
21Nov 2023
Insider Q&A: Pentagon AI Chief on Network-Centric Warfare, Generative AI Challenges
21Nov 2023
Sumo Logic Completes Investigation Into Recent Security Breach
21Nov 2023
Microsoft Paid Out $63 Million Since Launch of First Bug Bounty Program 10 Years Ago
21Nov 2023
Air Force CDAIO Eileen Vidrine on leading top-flight AI operations
21Nov 2023
7 steps for turning shadow IT into a competitive edge
21Nov 2023
Generative AI’s most noble mission: Improving and saving lives
20Nov 2023
Gen AI: Should you build or buy?
20Nov 2023
5 ways AI is showing promise as a decision-maker
20Nov 2023
Frucor Suntory amplifies sales and service with a unified mobile app
20Nov 2023
The $400 billion opportunity for AI in customer service
20Nov 2023
Morgan Stanley Fined $6.5 Million for Exposing Customer Information
20Nov 2023
CISA Releases Cybersecurity Guidance for Healthcare, Public Health Organizations
20Nov 2023
Johnson Controls Patches Critical Vulnerability in Industrial Refrigeration Products
20Nov 2023
Microsoft Hires Sam Altman and OpenAI’s New CEO Vows to Investigate His Firing
20Nov 2023
Russia’s LitterDrifter USB Worm Spreads Beyond Ukraine
20Nov 2023
Yamaha Motor Confirms Data Breach Following Ransomware Attack
20Nov 2023
5 Steps to Assessing Risk Profiles of Third-Party SSE Platforms
20Nov 2023
US Announces $70 Million Cybersecurity Boost for Rural, Municipal Utilities
20Nov 2023
250 Organizations Take Part in Electrical Grid Security Exercise
20Nov 2023
Can developer productivity be measured? Better than you think
20Nov 2023
6 most underhyped technologies in IT — plus one that’s not dead yet
20Nov 2023
K-12 Schools Improve Protection Against Online Attacks, but Many Are Vulnerable to Ransomware Gangs
18Nov 2023
ChatGPT-Maker OpenAI Fires CEO Sam Altman, the Face of the AI Boom, for Lack of Candor With Company
17Nov 2023
2 Environmentalists Who Were Targeted by a Hacking Network Say the Public Is the Real Victim
17Nov 2023
FCC Tightens Telco Rules to Combat SIM-Swapping
17Nov 2023
In Other News: Major Law Firm Hacked, Chinese Bank Pays Ransom, PyPI Security Audit
17Nov 2023
US Teen Pleads Guilty to Credential Stuffing Attack on Fantasy Sports Website
17Nov 2023
Over a Dozen Exploitable Vulnerabilities Found in AI/ML Tools
17Nov 2023
Researchers Dive Into Activities of Indian Hack-for-Hire Firm Appin
17Nov 2023
CISA Warns of Attacks Exploiting Sophos Web Appliance Vulnerability
17Nov 2023
Key GOP Lawmaker Calls for Renewal of Surveillance Tool as He Proposes Changes to Protect Privacy
17Nov 2023
Israeli Man Who Made $5M From Hacking Scheme Sentenced to Prison in US
17Nov 2023
CitrixBleed Vulnerability Exploitation Suspected in Toyota Ransomware Attack
17Nov 2023
What is a managed service provider? Strategic outsourcing for IT services
17Nov 2023
IHG maximizes hospitality with multicloud
16Nov 2023
Biden Campaign Looking for CISO
16Nov 2023
Google Adds Passkey Support to New Titan Security Key
16Nov 2023
State-Sponsored Online Spies Likely to Target Australian Submarine Program, Spy Agency Says
16Nov 2023
Zimbra Zero-Day Exploited to Hack Government Emails
16Nov 2023
Survey: Are you digitally ready for AI-enhanced ERP?
16Nov 2023
Bad Bots Account for 73% of Internet Traffic: Analysis
16Nov 2023
ServiceNow adds gen AI to more workflows, including chatbot creation
16Nov 2023
Administrator of Darkode Hacking Forum Sentenced to Prison
16Nov 2023
Threat Intel: To Share or Not to Share is Not the Question
16Nov 2023
Ransomware Group Files SEC Complaint Over Victim’s Failure to Disclose Data Breach
16Nov 2023
The Hartford CIO Deepa Soni on transforming at scale
16Nov 2023
5 ways to deploy your own large language model
16Nov 2023
Illuminating the black box: why CIOs should consider publishing an annual IT report
16Nov 2023
Microsoft Ignite 2023: 11 takeaways for CIOs
15Nov 2023
Malicious innovation, building resilience, and the importance of chocolate
15Nov 2023
A new and stronger entity: Versuni transforms its company – and technology
15Nov 2023
Microsoft Patches Sensitive Information Disclosure Vulnerability in Azure CLI
15Nov 2023
Application Security Startup Aikido Security Raises €5 Million
15Nov 2023
Data Security Firm ALTR Banks $25M Series C
15Nov 2023
US Announces IPStorm Botnet Takedown and Its Creator’s Guilty Plea
15Nov 2023
CISA Outlines AI-Related Cybersecurity Efforts
15Nov 2023
SAP Patches Critical Vulnerability in Business One Product
15Nov 2023
State-Backed Hackers a Threat to Australia, Agency Warns
15Nov 2023
RADICL Adds $9 Million in Funding to Fortify Cyber Defenses of SMBs in Defense Industrial Base
15Nov 2023
Addressing the State of AI’s Impact on Cyber Disinformation/Misinformation
15Nov 2023
How ServiceNow gets the most out of generative AI
15Nov 2023
We’re all becoming software CIOs — a role Red Hat CIO Jim Palermo knows well
15Nov 2023
CIO as enabler: Building an ecosystem of innovation partners
15Nov 2023
New Intel CPU Vulnerability ‘Reptar’ Can Allow DoS Attacks, Privilege Escalation
15Nov 2023
Chipmaker Patch Tuesday: Intel, AMD Address Over 130 Vulnerabilities
14Nov 2023
More connected, less secure: Addressing IoT and OT threats to the enterprise
14Nov 2023
Critical Authentication Bypass Flaw in VMware Cloud Director Appliance
14Nov 2023
The future of IT: what we can learn from the mainframe
14Nov 2023
How state and local governments can close the digital divide in education with fast, affordable connectivity
14Nov 2023
How leadership can empower developers in the AI era
14Nov 2023
Microsoft Warns of Critical Bugs Being Exploited in the Wild
14Nov 2023
The network is your office intelligence center
14Nov 2023
How 5G is driving big innovations in healthcare for veterans
14Nov 2023
How transportation agencies can maximize infrastructure investments with network modernization
14Nov 2023
UK Cybersecurity Center Says ‘Deepfakes’ and Other AI Tools Pose a Threat to the Next Election
14Nov 2023
Zip Raises $7.7 Million to Expand SMB Cybersecurity Business
14Nov 2023
Protected Virtual Machines Exposed to New ‘CacheWarp’ AMD CPU Attack
14Nov 2023
Adobe Patch Tuesday: Critical Bugs in Acrobat, Reader, ColdFusion
14Nov 2023
9 cloud strategy questions every IT leader must answer
14Nov 2023
What is code-to-cloud security intelligence?
14Nov 2023
Royal Ransomware Possibly Rebranding After Targeting 350 Organizations Worldwide
14Nov 2023
MySQL Servers, Docker Hosts Infected With DDoS Malware
14Nov 2023
ICS Patch Tuesday: 90 Vulnerabilities Addressed by Siemens and Schneider Electric
14Nov 2023
Radiant Snags $15 Million for AI-Powered SOC Technology
14Nov 2023
Top 10 API Security Threats for Q3 2023
14Nov 2023
Webinar Today: Using Governance and Privilege to Gain Control Over Third-Party Access
14Nov 2023
Google Suing Cybercriminals Who Delivered Malware via Fake Bard Downloads
14Nov 2023
Hacker Conversations: Chris Wysopal, AKA Weld Pond
14Nov 2023
PyPI Packages Found to Expose Thousands of Secrets
14Nov 2023
22 Energy Firms Hacked in Largest Coordinated Attack on Denmark’s Critical Infrastructure
14Nov 2023
Relationship management: The unsung art of optimizing IT teams
14Nov 2023
Where do IT leaders stand on securing the mainframe?
14Nov 2023
Getting the most out of open source without sacrificing security
14Nov 2023
4 steps to connect change management and DevOps
14Nov 2023
Bringing together DevOps and mainframe security
13Nov 2023
12 strategic tips CIOs can learn from tech vendor CTOs
13Nov 2023
The retail edge: Where data powers game-changing customer experiences
13Nov 2023
Ransomware Group RansomedVC Closes Shop
13Nov 2023
Dragos Says No Evidence of Breach After Ransomware Gang Claims Hack via Third Party
13Nov 2023
2.2 Million Impacted by Data Breach at McLaren Health Care
13Nov 2023
Ransomware Group Leaks Files Allegedly Stolen From Boeing
13Nov 2023
Operations at Major Australian Ports Significantly Disrupted by Cyberattack
13Nov 2023
Mr. Cooper Says Customer Data Compromised in Cyberattack
13Nov 2023
10 digital transformation roadblocks — and 5 tips for overcoming them
13Nov 2023
Yellen Says Ransomware Attack on China’s Biggest Bank Minimally Disrupted Treasury Market Trades
13Nov 2023
Huawei’s Vision for Intelligent Networking Unveiled at GITEX Global 2023
10Nov 2023
In Other News: EU Government Surveillance, Rewards for Iranian Hackers, Evolution of Chinese Spying
10Nov 2023
Cavelo Raises CA$5 Million for Attack Surface Management Platform
10Nov 2023
France, UK Seek Greater Regulation of Commercial Spyware
10Nov 2023
Intel Sued Over ‘Downfall’ CPU Vulnerability
10Nov 2023
1.3 Million Maine Residents Impacted by MOVEit Hack
10Nov 2023
US Government Issues Guidance on SBOM Consumption
10Nov 2023
Ransomware Attack on China’s Biggest Bank Disrupts Treasury Market Trades, Reports Say
10Nov 2023
4 ways ICA rebuilds and cleans up IT
10Nov 2023
How Synchrony helps veterans become IT leaders
10Nov 2023
How the new AI executive order stacks up: B-
09Nov 2023
Tidal Cyber Raises $5 Million for Threat-Informed Defense Platform
09Nov 2023
Medical Company Fined $450,000 by New York AG Over Data Breach
09Nov 2023
Securing your AI-powered network transformation: A guide for C-suite leaders
09Nov 2023
Generative AI: now is the time to ‘learn by doing’
09Nov 2023
Major ChatGPT Outage Caused by DDoS Attack
09Nov 2023
‘BlazeStealer’ Malware Delivered to Python Developers Looking for Obfuscation Tools
09Nov 2023
Japan Aviation Electronics Targeted in Ransomware Attack
09Nov 2023
Risk Ledger Raises £6.25 Million for Supply Chain Security Solution
09Nov 2023
In transition: How Kyndryl’s CIO weaned the company off IBM’s systems
09Nov 2023
Chief AI officer: What it takes to land the C-suite’s hottest new job
09Nov 2023
SysAid Zero-Day Vulnerability Exploited by Ransomware Group
09Nov 2023
CISA Says SLP Vulnerability Allowing Amplified DoS Attacks Exploited in the Wild
09Nov 2023
Russian Hackers Used Novel OT Attack to Disrupt Ukrainian Power Amid Mass Missile Strikes
08Nov 2023
Why you must extend Zero Trust to public cloud workloads
08Nov 2023
Protecto Joins Cadre of Startups in AI Data Protection Space
08Nov 2023
GitHub Enhances Security Capabilities With AI
08Nov 2023
DHS Launches New Critical Infrastructure Security and Resilience Campaign
08Nov 2023
Offense Intended: How Adversarial Emulation Went From State Secret To Board Bullet Point
08Nov 2023
Long and winding railroad – heading for the cloud
08Nov 2023
Sumo Logic Urges Users to Change Credentials Due to Security Breach
08Nov 2023
FBI Highlights Emerging Initial Access Methods Used by Ransomware Groups
08Nov 2023
Marina Bay Sands Discloses Data Breach Impacting 665k Customers
08Nov 2023
How a tech model at Univeris fosters team building with empathy
08Nov 2023
New US CIO appointments, November 2023
08Nov 2023
Principal Financial unifies IT to lay foundation for growth
08Nov 2023
Many CIOs are better equipped to combat rising IT costs. Are you?
08Nov 2023
Dropper Service Bypassing Android Security Restrictions to Install Malware
07Nov 2023
Guarding the gates: a look at critical infrastructure security in 2023
07Nov 2023
10 essential tips for bolstering cloud security in your business
07Nov 2023
Generative AI hallucinations: What can IT do?
07Nov 2023
Data Brokers Expose Sensitive US Military Member Info to Foreign Threat Actors: Study
07Nov 2023
Critical Vulnerabilities Expose Veeam ONE Software to Code Execution
07Nov 2023
Salesforce Automotive Cloud adds Einstein Studio, Fleet Management
07Nov 2023
Free Tool Helps Industrial Organizations Find OPC UA Vulnerabilities
07Nov 2023
New MacOS Malware Linked to North Korean Hackers
07Nov 2023
Myrror Security Emerges From Stealth Mode With $6 Million in Funding
07Nov 2023
37 Vulnerabilities Patched in Android With November 2023 Security Updates
07Nov 2023
Federal Push for Secure-by-Design: What It Means for Developers
07Nov 2023
Narrowing the Focus of AI in Security
07Nov 2023
Ransomware Gang Leaks Data Allegedly Stolen From Canadian Hospitals
07Nov 2023
What is Kyndryl? IBM’s managed infrastructure services spin-off explained
07Nov 2023
The CIO’s fatal flaw: Too much leadership, not enough management
07Nov 2023
Breaking down data silos for digital success
07Nov 2023
Cybersecurity M&A Roundup: 31 Deals Announced in October 2023
06Nov 2023
Travelers to Acquire Cyberinsurance Firm Corvus for $435 Million
06Nov 2023
Palo Alto to Acquire Talon, Intensifying Competition in Cloud Data Security
06Nov 2023
American Airlines Pilot Union Recovering After Ransomware Attack
06Nov 2023
US Sanctions Russian National for Helping Ransomware Groups Launder Money
06Nov 2023
‘Looney Tunables’ Glibc Vulnerability Exploited in Cloud Attacks
06Nov 2023
Iranian APT Targets Israeli Education, Tech Sectors With New Wipers
06Nov 2023
Exploitation of Critical Confluence Vulnerability Begins
06Nov 2023
The RACI matrix: Your blueprint for project success
06Nov 2023
Employee engagement: 10 best practices for improving your culture
06Nov 2023
IT leader’s survival guide: 8 tips to thrive in the years ahead
06Nov 2023
A Cyber Breach Delays Poll Worker Training in Mississippi’s Largest County Before the Statewide Vote
06Nov 2023
Microsoft Says Exchange ‘Zero Days’ Disclosed by ZDI Already Patched or Not Urgent
05Nov 2023
Low-code: An Accelerator for Digital Transformation
03Nov 2023
How AI can drive efficiencies in your supply chain
03Nov 2023
Mortgage Giant Mr. Cooper Shuts Down Systems Following Cyberattack
03Nov 2023
Okta Hack Blamed on Employee Using Personal Google Account on Company Laptop
03Nov 2023
In Other News: Airport Taxi Hacking, Post-Quantum Crypto Guidance, Stanford Breach
03Nov 2023
North Korean Hackers Use New ‘KandyKorn’ macOS Malware in Attacks
03Nov 2023
Apache ActiveMQ Vulnerability Exploited as Zero-Day
03Nov 2023
Cyberattack Disrupts Ace Hardware’s Operations
03Nov 2023
Industry Reactions to SEC Charging SolarWinds and Its CISO: Feedback Friday
03Nov 2023
Atlassian Issues Second Warning on Potential Exploitation of Critical Confluence Flaw
03Nov 2023
What Duxbury Networking’s CIO does to balance head with heart
03Nov 2023
Burnout: An IT epidemic in the making
02Nov 2023
CIOs sharpen cloud cost strategies — just as gen AI spikes loom
02Nov 2023
When least privilege is the most important thing
02Nov 2023
After Major Cloud Hacks, Microsoft Unveils ‘Secure Future Initiative’
02Nov 2023
Your biggest barriers to digital transformation aren’t technical…they’re cultural
02Nov 2023
Xage Targets New Markets with $20 Million Investment
02Nov 2023
Former SpaceX Engineers Get $8 Million in Funding for AI Security Firm Wraithwatch
02Nov 2023
FusionAuth Snags $65 Million Investment for Customer Identity Tech
02Nov 2023
SASE success: Avoid confusion and embrace a single-vendor solution
02Nov 2023
Critical Apache ActiveMQ Vulnerability Exploited to Deliver Ransomware
02Nov 2023
Is your data strategy ready for gen AI? LOB leaders may disagree
02Nov 2023
European Privacy Officials Widen Ban on Meta’s Behavioral Advertising to Most of Europe
02Nov 2023
Microsoft Temporarily Disables SketchUp Support After Discovery of 117 Vulnerabilities
02Nov 2023
AP News Site Hit by Apparent Denial-of-Service Attack
02Nov 2023
Boeing Confirms Distribution Business Hit by Cyberattack
02Nov 2023
Rajeev Ronanki on making the leap to CEO
02Nov 2023
What is data analytics? Transforming data into better decisions
02Nov 2023
Cisco Patches 27 Vulnerabilities in Network Security Products
02Nov 2023
SAP unveils tools to help enterprises build their own gen AI apps
01Nov 2023
A simplified view of the enterprise tech market
01Nov 2023
FIRST Releases CVSS 4.0 Vuln Scoring Standard
01Nov 2023
Countries at a UK Summit Pledge to Tackle AI’s Potentially ‘Catastrophic’ Risks
01Nov 2023
8 ways IT can help supercharge your sales team
01Nov 2023
Mozi Botnet Likely Killed by Its Creators
01Nov 2023
Fighting fire with…data
01Nov 2023
Supply Chain Startup Chainguard Scores $61 Million Series B
01Nov 2023
Dozens of Kernel Drivers Allow Attackers to Alter Firmware, Escalate Privileges
01Nov 2023
Mass Exploitation of ‘Citrix Bleed’ Vulnerability Underway
01Nov 2023
Iranian Cyber Spies Use ‘LionTail’ Malware in Latest Attacks
01Nov 2023
MITRE Releases ATT&CK v14 With Improvements to Detections, ICS, Mobile
01Nov 2023
Chrome 119 Patches 15 Vulnerabilities
01Nov 2023
Malicious NuGet Packages Abuse MSBuild Integrations for Code Execution
01Nov 2023
DPI: Still Effective for the Modern SOC?
01Nov 2023
SIEM and Log Management Provider Graylog Raises $39 Million
01Nov 2023
Cutting-Edge AI Raises Fears About Risks to Humanity. Are Tech and Political Leaders Doing Enough?
01Nov 2023
CIOs still grapple with what gen AI can do for the enterprise
01Nov 2023
Digital pragmatism at Volvo means more control and less agile
01Nov 2023
Former British Cyberespionage Agency Employee Gets Life in Prison for Stabbing an American Spy
31Oct 2023
Navigating Cloud Cost Complexity and Security
31Oct 2023
Beyond DevSecOps: Why fintech companies need to consider DevSecRegOps
31Oct 2023
Cybersecurity Leaders Spooked by SEC Lawsuit Against SolarWinds CISO
31Oct 2023
Atlassian CISO Urges Quick Action to Protect Confluence Instances From Critical Vulnerability
31Oct 2023
Palo Alto Networks to Acquire Cloud Security Start-Up Dig Security
31Oct 2023
IAM Credentials in Public GitHub Repositories Harvested in Minutes
31Oct 2023
Scaling security: How to build security into the entire development pipeline
31Oct 2023
Attackers Exploiting Critical F5 BIG-IP Vulnerability
31Oct 2023
Welcome to the trusted edge
31Oct 2023
Extending ZTNA to Protect Against Insider Threats
31Oct 2023
Ethics in IT: The CIO’s new business imperative
31Oct 2023
SEC Charges SolarWinds and Its CISO With Fraud and Cybersecurity Failures
30Oct 2023
Canada Bans WeChat and Kaspersky on Government Phones
30Oct 2023
Want AI? Here’s how to get your data and infrastructure AI-ready
30Oct 2023
How Value Stream Management is fueling success at Boeing, Tyson, and Verizon
30Oct 2023
Boeing Investigating Ransomware Attack Claims
30Oct 2023
Proofpoint to Acquire Tessian for AI-Powered Email Security Tech
30Oct 2023
Florida SIM Swapper Sentenced to Prison for Cryptocurrency Theft
30Oct 2023
Attackers Can Use Modified Wikipedia Pages to Mount Redirection Attacks on Slack
30Oct 2023
Apple Improves iMessage Security With Contact Key Verification
30Oct 2023
Hackers Earn Over $1 Million at Pwn2Own Toronto 2023
30Oct 2023
AI Safety Summit: What to expect as global leaders eye AI regulation
30Oct 2023
Biden Wants to Move Fast on AI Safeguards and Will Sign an Executive Order to Address His Concerns
30Oct 2023
Whistleblowers: Should CISOs Consider Them a Friend or Foe?
30Oct 2023
Why adaptability is the new digital transformation
30Oct 2023
The rise of the chief transformation officer
27Oct 2023
Advanced ‘StripedFly’ Malware With 1 Million Infections Shows Similarities to NSA-Linked Tools
27Oct 2023
In Other News: Ex-NSA Employee Spying for Russia, EU Threat Landscape, Cyber Education Funding
27Oct 2023
F5 Warns of Critical Remote Code Execution Vulnerability in BIG-IP
27Oct 2023
UN Chief Appoints 39-Member Panel to Advise on International Governance of Artificial Intelligence
27Oct 2023
16 best entry-level IT certifications to launch your career
27Oct 2023
Lufthansa’s digital future takes flight with ‘Digital Hangar’
27Oct 2023
AWS revenue growth stabilizes with a boost from generative AI-led services
26Oct 2023
With generative AI, IT must deliver knowledge…not just technology
26Oct 2023
What IT executives are saying about vendor consolidation
26Oct 2023
Why IT needs to be in the driver’s seat with generative AI
26Oct 2023
Run Generative AI on-premises, with a cloud experience
26Oct 2023
Critical Mirth Connect Vulnerability Could Expose Sensitive Healthcare Data
26Oct 2023
AI Security Firm Cranium Raises $25 Million
26Oct 2023
Hackers Earn $350k on Second Day at Pwn2Own Toronto 2023
26Oct 2023
iLeakage Attack Exploits Safari to Steal Sensitive Data From Macs, iPhones
26Oct 2023
CISA, HHS Release Cybersecurity Healthcare Toolkit
26Oct 2023
Kansas Court System Down Nearly 2 Weeks in ‘Security Incident’ That Has Hallmarks of Ransomware
26Oct 2023
Key Learnings from “Big Game” Ransomware Campaigns
26Oct 2023
Weapons Systems Provide Valuable Lessons for ICS/OT Security
26Oct 2023
Japanese Watchmaking Giant Seiko Confirms Personal Data Stolen in Ransomware Attack
26Oct 2023
Google Announces Bug Bounty Program and Other Initiatives to Secure AI
26Oct 2023
Day 3 of SecurityWeek’s 2023 ICS Cybersecurity Conference — Challenges and Solutions
26Oct 2023
Amazon Rolls Out Independent Cloud for Europe to Address Stricter Privacy Standards
26Oct 2023
IBM bets on generative AI to escape economic headwinds
26Oct 2023
COO Marina Bellini on leading IT talent for growth
26Oct 2023
What is a business intelligence analyst? A key role for data-driven decisions
26Oct 2023
5 key leadership skills an executive coach can help you master
26Oct 2023
Multicloud by design simplifies your cloud experience
25Oct 2023
‘YoroTrooper’ Espionage Group Linked to Kazakhstan
25Oct 2023
Apple Ships Major iOS, macOS Security Updates
25Oct 2023
Generative AI: 5 enterprise predictions for AI and security — for 2023, 2024, and beyond
25Oct 2023
What you need to know about Okta’s security breach
25Oct 2023
How medical technology helps us live the best version of ourselves
25Oct 2023
Firefox, Chrome Updates Patch High-Severity Vulnerabilities
25Oct 2023
Russian Hackers Caught Exploiting Roundcube Webmail Zero-Day
25Oct 2023
Hackers Earn $400k on First Day at Pwn2Own Toronto 2023
25Oct 2023
Mandiant Intelligence Chief Raises Alarm Over China’s ‘Volt Typhoon’ Hackers in US Critical Infrastructure
25Oct 2023
Part 1: Guarding against sophisticated threats: Strategies for your best defense
25Oct 2023
Part 2: Guarding against sophisticated threats: Strategies for your best defense
25Oct 2023
New Project Analyzes and Catalogs Vendor Support for Secure PLC Coding
25Oct 2023
What is AI’s current impact on cybersecurity?
25Oct 2023
Censys Banks $75M for Attack Surface Management Technology
25Oct 2023
Critical Infrastructure Stakeholders Gather for Day 2 of SecurityWeek’s 2023 ICS Cybersecurity Conference
25Oct 2023
VMware vCenter Flaw So Critical, Patches Released for End-of-Life Products
25Oct 2023
The Cybersecurity Resilience Quotient: Measuring Security Effectiveness
25Oct 2023
How Whirlpool’s CIO makes digital business models run end to end
25Oct 2023
3 commandments that should drive every API strategy
25Oct 2023
Author E. Freya Williams has a Message for Tech Leaders
24Oct 2023
Personal Information Stolen in City of Philadelphia Email Hack
24Oct 2023
Top overlooked GenAI security risks for businesses
24Oct 2023
Fortifying your engineering ecosystem: The three pillars of application security
24Oct 2023
Unveiling the risks of OT systems and how to secure them
24Oct 2023
Exploring the pros and cons of cloud-based large language models
24Oct 2023
Utilizing AI to defend the Black Hat NOC
24Oct 2023
What do Security Operations Centers really need—today…and tomorrow
24Oct 2023
Empowering cyber resilience in education: Three strategies for the future
24Oct 2023
Four things that matter in the AI hype cycle
24Oct 2023
Rockwell Automation Warns Customers of Cisco Zero-Day Affecting Stratix Switches
24Oct 2023
Stealth Techniques Used in ‘Operation Triangulation’ iOS Attack Dissected
24Oct 2023
The $64k Question: How Does AI Phishing Stack Up Against Human Social Engineers?
24Oct 2023
Generative AI and the Transformation of Everything
24Oct 2023
University of Michigan Says Personal Information Stolen in August Data Breach
24Oct 2023
Adlumin Snags $70M to Boost Security for Mid-Market Firms
24Oct 2023
Number of Cisco Devices Hacked via Zero-Day Remains High as Attackers Update Implant
24Oct 2023
Canada: Lawmakers Targeted by China-Linked ‘Spamouflage’ Disinformation
24Oct 2023
SecurityWeek’s 2023 ICS Cybersecurity Conference Kicks Off in Atlanta
24Oct 2023
7 ways diversity and inclusion help teams perform better
24Oct 2023
7 sins of digital transformation
23Oct 2023
Before generative AI there was… just AI
23Oct 2023
China Crackdown on Cyber Scams in Southeast Asia Nets Thousands but Leaves Networks Intact
23Oct 2023
DEAC and DLC: Delivering sustainable cloud services to the Baltics and beyond
23Oct 2023
Casio Says Personal Information Accessed in Web Application Server Hack
23Oct 2023
Blockaid Emerges From Stealth With $33 Million Investment
23Oct 2023
SolarWinds Patches High-Severity Flaws in Access Rights Manager
23Oct 2023
Rockwell Automation to Acquire ICS/OT Security Firm Verve Industrial
23Oct 2023
Enterprise Browser Startup Island Banks $100M in Funding
23Oct 2023
DC Board of Elections Says Full Voter Roll Compromised in Data Breach
23Oct 2023
Accelerating sustainability to build stronger businesses
23Oct 2023
Becoming the sustainability partner our customers need
23Oct 2023
Elevate your digital transformation with impactful sustainability
23Oct 2023
Accelerating digital transformation with sustainable solutions
23Oct 2023
Future First: Sustainability at Equinix
23Oct 2023
ESG in Action: The Dell Technologies FY23 ESG Report
23Oct 2023
Data-driven sustainability: Dell’s commitment to industry standards
23Oct 2023
Embracing sustainable IT unlocks environmental, business, and financial benefits
23Oct 2023
How we’re driving sustainable impact for business and society
23Oct 2023
Unlock sustainability and efficiency with Dell APEX
23Oct 2023
Cisco Finds Second Zero-Day as Number of Hacked Devices Apparently Drops
23Oct 2023
5 steps for making tech ethics work for your company
23Oct 2023
Transforming IT for digital success
23Oct 2023
The strategy behind becoming a manufacturing superpower
20Oct 2023
Allstate’s cloud-first approach to digital transformation pays off
20Oct 2023
Mainframe data: hybrid cloud object store vs. tape
20Oct 2023
How to manage data integration during an acquisition
20Oct 2023
Okta Support System Hacked, Sensitive Customer Data Stolen
20Oct 2023
Bud Financial helps banks and their customers make more informed decisions using AI with DataStax and Google Cloud
20Oct 2023
In Other News: Energy Services Firm Hacked, Tech CEO Gets Prison Time, X Glitch Leads to CIA Channel Hijack
20Oct 2023
Philippine Military Ordered to Stop Using Artificial Intelligence Apps Due to Security Risks
20Oct 2023
Three burning questions before FutureIT New York
20Oct 2023
Fraud Detection Firm Spec Raises $15 Million
20Oct 2023
Authorities Seize Control of RagnarLocker Ransomware Dark Web Site
20Oct 2023
Managing and fulfilling complex, high-volume B2B orders
20Oct 2023
Iranian Hackers Lurked for 8 Months in Government Network
20Oct 2023
What is a Scrum master? A key role for project success
20Oct 2023
Top 8 IT certifications in demand today
20Oct 2023
HUAWEI eKit makes digital business easy for distributors
19Oct 2023
5 modern challenges in data integration and how CIOs can overcome them
19Oct 2023
CIOs press ahead for gen AI edge — despite misgivings
19Oct 2023
Harmonic Lands $7M Funding to Secure Generative AI Deployments
19Oct 2023
Unleashing the power of integration to scale industrial equipment sales, manufacturing, and service global channels
19Oct 2023
FBI: Thousands of Remote IT Workers Sent Wages to North Korea to Help Fund Weapons Program
19Oct 2023
CipherStash Raises $3 Million for Encryption-in-Use Technology
19Oct 2023
Google Play Protect Gets Real-Time Code Scanning
19Oct 2023
US Government Releases Anti-Phishing Guidance
19Oct 2023
Operations of Healthcare Solutions Giant Henry Schein Disrupted by Cyberattack
19Oct 2023
Number of Cisco Devices Hacked via Unpatched Vulnerability Increases to 40,000
19Oct 2023
The biggest enterprise technology M&A deals of the year
19Oct 2023
13 power tips for Microsoft Power BI
19Oct 2023
Inside Walmart’s generative AI journey
19Oct 2023
North Korean Hackers Exploiting Recent TeamCity Vulnerability
18Oct 2023
Finland Charges Psychotherapy Hacker With Extortion
18Oct 2023
Three Months After Patch, Gov-Backed Actors Exploiting WinRAR Flaw
18Oct 2023
Predictive analytics helps Fresenius Medical Care anticipate dialysis complications
18Oct 2023
Survey: Why CIOs and CTOs want a new model for IT support and services
18Oct 2023
Former Navy IT Manager Sentenced to Prison for Hacking, Selling PII
18Oct 2023
Darwinium Raises $18 Million for Edge-based Fraud Prevention Tech
18Oct 2023
D-Link Says Hacker Exaggerated Data Breach Claims
18Oct 2023
Fraud Prevention Firm Fingerprint Raises $33 Million
18Oct 2023
Cybersecurity M&A Roundup for First Half of October 2023
18Oct 2023
Oracle Patches 185 Vulnerabilities With October 2023 CPU
18Oct 2023
Lost and Stolen Devices: A Gateway to Data Breaches and Leaks
18Oct 2023
How digital turned Nationale-Nederlanden into an omnichannel company
18Oct 2023
Tens of Thousands of Cisco Devices Hacked via Zero-Day Vulnerability
18Oct 2023
Recent NetScaler Vulnerability Exploited as Zero-Day Since August
17Oct 2023
Dawn of a new day for Africa: building a modern digital economy
17Oct 2023
The 4 pillars of the Zscaler Zero Trust Exchange: Customers share their successes
17Oct 2023
Don’t make the biggest mistake in application modernization projects
17Oct 2023
CIOs must safeguard organizations with a validated Zero Trust solution
17Oct 2023
NetSuite adds generative AI to its entire ERP suite
17Oct 2023
Prove Identity Snags $40M Funding for ID Verification Tech
17Oct 2023
Beyond Quantum: MemComputing ASICs Could Shatter 2048-bit RSA Encryption
17Oct 2023
Critical Vulnerabilities Expose Weintek HMIs to Attacks
17Oct 2023
Anonybit Raises $3 Million for Biometric Authentication Platform
17Oct 2023
US Gov Expects Widespread Exploitation of Atlassian Confluence Vulnerability
17Oct 2023
NSA Publishes ICS/OT Intrusion Detection Signatures and Analytics
17Oct 2023
How to get internal employee poaching right
17Oct 2023
7 cloud market trends and how they will impact IT
17Oct 2023
WordPress Websites Hacked via Royal Elementor Plugin Zero-Day
17Oct 2023
Cisco Devices Hacked via IOS XE Zero-Day Vulnerability
16Oct 2023
Don’t gamble with your identity verification practices
16Oct 2023
How to capitalize on ‘Trustworthy AI’
16Oct 2023
The case for predictive AI
16Oct 2023
FinOps is the discipline enterprises need to optimize cloud spending
16Oct 2023
Exploring crucial terminal emulation capabilities
16Oct 2023
How to get started with AI to speed software delivery
16Oct 2023
Are enterprise architects the new platform team leaders?
16Oct 2023
Is it time to install a Chief AI Officer?
16Oct 2023
PCI DSS version 4.0: Is your payment card data security program ready?
16Oct 2023
PCI compliance: The best defense is a great defense
16Oct 2023
IT services company Atos runs into headwinds with plan for IBM-style split
16Oct 2023
PCI compliance: Is your qualified security assessor up to the task?
16Oct 2023
Signal Pours Cold Water on Zero-Day Exploit Rumors
16Oct 2023
Academics Devise Cyber Intrusion Detection System for Unmanned Robots
16Oct 2023
Milesight Industrial Router Vulnerability Possibly Exploited in Attacks
16Oct 2023
Equifax Fined $13.5 Million Over 2017 Data Breach
16Oct 2023
Microsoft Improving Windows Authentication, Disabling NTLM
16Oct 2023
Cedar Fair’s digital strategy based on ‘frictionless fun’
16Oct 2023
Hybrid meetings: 5 best practices for better outcomes
16Oct 2023
Why IT projects still fail
16Oct 2023
EPA Withdraws Water Sector Cybersecurity Rules Due to Lawsuits
16Oct 2023
Spyware Caught Masquerading as Israeli Rocket Alert Applications
13Oct 2023
Business AI will change the way businesses are run
13Oct 2023
CISA Now Flagging Vulnerabilities, Misconfigurations Exploited by Ransomware
13Oct 2023
In Other News: Ex-Uber Security Chief Appeal, New Offerings From Tech Giants, Crypto Bounty
13Oct 2023
Juniper Networks Patches Over 30 Vulnerabilities in Junos OS
13Oct 2023
What is a data architect? Skills, salaries, and how to become a data framework master
13Oct 2023
11 most in-demand gen AI jobs companies are hiring for
13Oct 2023
Microsoft Offers Up to $15,000 in New AI Bug Bounty Program
13Oct 2023
Dozens of Squid Proxy Vulnerabilities Remain Unpatched 2 Years After Disclosure
13Oct 2023
Microsoft receives $29B IRS tax notices for decade-old transactions
12Oct 2023
Your Generative AI strategy could use a startup’s touch
12Oct 2023
SAP’s new generative AI pricing: Neither transparent nor explainable yet
12Oct 2023
Proving your worth: Strategies to validate and elevate your IT service department
12Oct 2023
SEC Investigating Progress Software Over MOVEit Hack
12Oct 2023
The heat is on for a sustainable future at Siemens Gamesa
12Oct 2023
Apple Releases iOS 16 Update to Patch Exploited Vulnerability
12Oct 2023
Backdoor Malware Found on WordPress Website Disguised as Legitimate Plugin
12Oct 2023
LinkedIn Smart Links Abused in Phishing Campaign Targeting Microsoft Accounts
12Oct 2023
Unpatched Vulnerabilities Expose Yifan Industrial Routers to Attacks
12Oct 2023
SAP offers faster updates, longer maintenance for S/4HANA in private clouds
12Oct 2023
Simpson Manufacturing Takes Systems Offline Following Cyberattack
12Oct 2023
CISO Pay Increases Are Slowing – a Look Behind the Figures
12Oct 2023
Generac’s Tim Dickson on the evolving CIO role
12Oct 2023
20 traits of highly effective project managers
12Oct 2023
SYN Ventures Announces $75 Million Seed Fund for US Cybersecurity Firms
11Oct 2023
Powering the future: How Gen AI and AI illuminate utility companies
11Oct 2023
Critical SOCKS5 Vulnerability in cURL Puts Enterprise Systems at Risk
11Oct 2023
Citrix Patches Critical NetScaler ADC, Gateway Vulnerability
11Oct 2023
Payment Card Data Stolen in Air Europa Hack
11Oct 2023
US Government Releases Security Guidance for Open Source Software in OT, ICS
11Oct 2023
Chrome 118 Patches 20 Vulnerabilities
11Oct 2023
Applying AI to API Security
11Oct 2023
Organizations Respond to HTTP/2 Zero-Day Exploited for DDoS Attacks
11Oct 2023
Chief AI officers in demand as IT leaders expect gen AI productivity boost, survey finds
11Oct 2023
Building elite teams to map out the business and customer journey
11Oct 2023
The CIO at a crossroads: Evolve or become a dead-end job
11Oct 2023
ICS Patch Tuesday: Siemens Ruggedcom Devices Affected by Nozomi Component Flaws
11Oct 2023
CISA Warns of Attacks Exploiting Adobe Acrobat Vulnerability
11Oct 2023
Implications of generative AI for enterprise security
10Oct 2023
Microsoft Blames Nation-State Threat Actor for Confluence Zero-Day Attacks
10Oct 2023
Salesforce IT injects generative AI to ease its massive datacenter migration
10Oct 2023
Microsoft Fixes Exploited Zero-Days in WordPad, Skype for Business
10Oct 2023
Beyond the Front Lines: How the Israel-Hamas War Impacts the Cybersecurity Industry
10Oct 2023
Patch Tuesday: Code Execution Flaws in Adobe Commerce, Photoshop
10Oct 2023
Unlocking productivity: 3 key priorities for tech leaders in the age of AI
10Oct 2023
Mirai Variant IZ1H9 Adds 13 Exploits to Arsenal
10Oct 2023
An AI leadership haiku
10Oct 2023
‘HTTP/2 Rapid Reset’ Zero-Day Exploited to Launch Largest DDoS Attacks in History
10Oct 2023
SecurityWeek to Host 2023 ICS Cybersecurity Conference October 23-26 in Atlanta
10Oct 2023
SAP Releases 7 New Notes on October 2023 Patch Day
10Oct 2023
One-Click GNOME Exploit Could Pose Serious Threat to Linux Systems
10Oct 2023
New ‘Grayling’ APT Targeting Organizations in Taiwan, US
10Oct 2023
Twistlock Founders Score Whopping $51M Seed Funding for Gutsy
10Oct 2023
Cable Giant Volex Targeted in Cyberattack
10Oct 2023
Magecart Web Skimmer Hides in 404 Error Pages
10Oct 2023
Researcher Conversations: Natalie Silvanovich From Google’s Project Zero
10Oct 2023
College of Southern Nevada deploys AI avatar to better engage students
10Oct 2023
The CIO’s primary job: Developing future IT leaders
10Oct 2023
8 tips for cultivating a winning IT culture
09Oct 2023
Recently Patched TagDiv Plugin Flaw Exploited to Hack Thousands of WordPress Sites
09Oct 2023
Credential Harvesting Campaign Targets Unpatched NetScaler Instances
09Oct 2023
Patches Prepared for ‘Probably Worst’ cURL Vulnerability
09Oct 2023
Google Expands Bug Bounty Program With Chrome, Cloud CTF Events
09Oct 2023
DC Board of Elections Discloses Data Breach
09Oct 2023
What enterprise software vendors are doing with generative AI
09Oct 2023
CIOs set their agendas to achieve IT’s ultimate balancing act
09Oct 2023
Hackers Join In on Israel-Hamas War With Disruptive Cyberattacks
07Oct 2023
Taiwan Probes Firms Suspected of Selling Chip Equipment to China’s Huawei Despite US Sanctions
07Oct 2023
Take control of your Oracle unlimited licensing agreement
06Oct 2023
MGM Resorts Says Ransomware Hack Cost $110 Million
06Oct 2023
Android Devices With Backdoored Firmware Found in US Schools
06Oct 2023
Microsoft Releases New Report on Cybercrime, State-Sponsored Cyber Operations
06Oct 2023
In Other News: Funding Increase, Abuse of Smartphone Location Data, Legal Matters
06Oct 2023
Nonprofit Service Provider Blackbaud Settles Data Breach Case for $49.5M With States
06Oct 2023
Organizations Warned of Top 10 Cybersecurity Misconfigurations Seen by CISA, NSA
06Oct 2023
What is a business analyst? A key role for business-IT efficiency
06Oct 2023
CISA Reverses Course on Malicious Exploitation of Video Conferencing Device Flaws
06Oct 2023
ST Engineering showcases applications of new technologies to stay ahead of disruption
05Oct 2023
A CIO’s guide to the developer platform: What it is and why you need it
05Oct 2023
Cisco Plugs Gaping Hole in Emergency Responder Software
05Oct 2023
GitHub Improves Secret Scanning Feature With Expanded Token Validity Checks
05Oct 2023
Red Cross Publishes Rules of Engagement for Hacktivists During War
05Oct 2023
BlackBerry to Split Cybersecurity, IoT Business Units
05Oct 2023
Linux Foundation Announces OpenPubkey Open Source Cryptographic Protocol
05Oct 2023
CISA, NSA Publish Guidance on IAM Challenges for Developers, Vendors
05Oct 2023
Hundreds Download Malicious NPM Package Capable of Delivering Rootkit
05Oct 2023
Qakbot Hackers Continue to Push Malware After Takedown Attempt
05Oct 2023
Addressing the People Problem in Cybersecurity
05Oct 2023
CBRE’s Sandeep Davé on accelerating your AI ambitions
05Oct 2023
7 sins of software development
05Oct 2023
Sony Confirms Data Stolen in Two Recent Hacker Attacks
04Oct 2023
Building sustainability at the edge of the enterprise
04Oct 2023
3 hard truths about GenAI’s large language models
04Oct 2023
Document Security is More than Just Password-Protection
04Oct 2023
Apple Warns of Newly Exploited iOS 17 Kernel Zero-Day
04Oct 2023
Atlassian Ships Urgent Patch for Exploited Confluence Zero-Day
04Oct 2023
New Supermicro BMC Vulnerabilities Could Expose Many Servers to Remote Attacks
04Oct 2023
Lyca Mobile Services Significantly Disrupted by Cyberattack
04Oct 2023
Mozilla Warns of Fake Thunderbird Downloads Delivering Ransomware
04Oct 2023
Google, Yahoo Boosting Email Spam Protections
04Oct 2023
Severe Glibc Privilege Escalation Vulnerability Impacts Major Linux Distributions
04Oct 2023
Skilled IT pay defined by volatility, security, and AI
04Oct 2023
What a quarter century of digital transformation at PayPal looks like
04Oct 2023
4 reasons why gen AI projects fail
04Oct 2023
Qualcomm Patches 3 Zero-Days Reported by Google
03Oct 2023
Future-Proofing Your Business with Hyperautomation
03Oct 2023
ZDI Discusses First Automotive Pwn2Own
03Oct 2023
Synqly Joins Race to Fix Security, Infrastructure Product Integrations
03Oct 2023
A new solution offers fresh air—not as a dream, but a service
03Oct 2023
Critical TorchServe Flaws Could Expose AI Infrastructure of Major Companies
03Oct 2023
US Executives Targeted in Phishing Attacks Exploiting Flaw in Indeed Job Platform
03Oct 2023
Actor Tom Hanks Warns of Ad With AI Imposter
03Oct 2023
Dozens of Malicious NPM Packages Steal User, System Data
03Oct 2023
Network, Meet Cloud; Cloud, Meet Network
03Oct 2023
ConocoPhillips goes global with digital twins
03Oct 2023
Why all IT talent should be irreplaceable
03Oct 2023
Cybersecurity M&A Roundup: 28 Deals Announced in September 2023
03Oct 2023
Android’s October 2023 Security Updates Patch Two Exploited Vulnerabilities
03Oct 2023
Motel One Discloses Ransomware Attack Impacting Customer Data
03Oct 2023
Companies Address Impact of Exploited Libwebp Vulnerability
02Oct 2023
Unlocking value: Oracle enterprise license models for optimal ROI
02Oct 2023
Lessons from the field: Why you need a platform engineering practice (…and how to build it)
02Oct 2023
Live Exploitation Underscores Urgency to Patch Critical WS-FTP Server Flaw
02Oct 2023
Number of Internet-Exposed ICS Drops Below 100,000: Report
02Oct 2023
European Telecommunications Standards Institute Discloses Data Breach
02Oct 2023
Johnson Controls Ransomware Attack Could Impact DHS
02Oct 2023
Unpatched Exim Vulnerabilities Expose Many Mail Servers to Attacks
02Oct 2023
What is a project management office (PMO)? The key to standardizing project success
02Oct 2023
The dark arts of digital transformation — and how to master them
02Oct 2023
Silverfort Open Sources Lateral Movement Detection Tool
02Oct 2023
Recently Patched TeamCity Vulnerability Exploited to Hack Servers
02Oct 2023
CISA Kicks Off Cybersecurity Awareness Month With New Program
30Sep 2023
The changing face of cybersecurity threats in 2023
29Sep 2023
Bankrupt IronNet Shuts Down Operations
29Sep 2023
Should finance organizations bank on Generative AI?
29Sep 2023
AWS Using MadPot Decoy System to Disrupt APTs, Botnets
29Sep 2023
Generative AI Startup Nexusflow Raises $10.6 Million
29Sep 2023
Researchers Extract Sounds From Still Images on Smartphone Cameras
29Sep 2023
In Other News: RSA Encryption Attack, Meta AI Privacy, ShinyHunters Hacker Guilty Plea
29Sep 2023
Embrace the Generative AI revolution: a guide to integrating Generative AI into your operations
29Sep 2023
National Security Agency is Starting an Artificial Intelligence Security Center
29Sep 2023
CISA Warns of Old JBoss RichFaces Vulnerability Being Exploited in Attacks
29Sep 2023
Hackers Set Sights on Apache NiFi Flaw That Exposes Many Organizations to Attacks
29Sep 2023
NIST Publishes Final Version of 800-82r3 OT Security Guide
29Sep 2023
A Key US Government Surveillance Tool Should Face New Limits, a Divided Privacy Oversight Board Says
29Sep 2023
Cloudflare Users Exposed to Attacks Launched From Within Cloudflare: Researchers
29Sep 2023
Top 17 cloud cost management tools — and how to choose
29Sep 2023
10 most in-demand generative AI skills
29Sep 2023
Johnson Controls Hit by Ransomware
29Sep 2023
FBI Warns Organizations of Dual Ransomware, Wiper Attacks
29Sep 2023
US State Department Says 60,000 Emails Taken in Alleged Chinese Hack
28Sep 2023
Progress Software Patches Critical Pre-Auth Flaws in WS_FTP Server Product
28Sep 2023
Government Shutdown Could Bench 80% of CISA Staff
28Sep 2023
Lumu Raises $30 Million for Threat Detection and Response Platform
28Sep 2023
Verisoul Raises $3.25 Million in Seed Funding to Detect Fake Users
28Sep 2023
Moving From Qualitative to Quantitative Cyber Risk Modeling
28Sep 2023
Russian Zero-Day Acquisition Firm Offers $20 Million for Android, iOS Exploits
28Sep 2023
Cisco Warns of IOS Software Zero-Day Exploitation Attempts
28Sep 2023
Sysdig Launches Realtime Attack Graph for Cloud Environments
28Sep 2023
Qualcomm’s Cisco Sanchez on structuring IT for business growth
28Sep 2023
12 ‘best practices’ IT should avoid at all costs
28Sep 2023
Google Rushes to Patch New Zero-Day Exploited by Spyware Vendor
27Sep 2023
Chinese Gov Hackers Caught Hiding in Cisco Router Firmware
27Sep 2023
CISA Unveils New HBOM Framework to Track Hardware Components
27Sep 2023
Misconfigured TeslaMate Instances Put Tesla Car Owners at Risk
27Sep 2023
Gem Security Lands $23 Million Series A Funding
27Sep 2023
Google Open Sources Binary File Comparison Tool BinDiff
27Sep 2023
Stolen GitHub Credentials Used to Push Fake Dependabot Commits
27Sep 2023
Firefox 118 Patches High-Severity Vulnerabilities
27Sep 2023
macOS 14 Sonoma Patches 60 Vulnerabilities
27Sep 2023
A fluency in business and tech yields success at NATO
27Sep 2023
Gen AI success starts with an effective pilot strategy
27Sep 2023
New GPU Side-Channel Attack Allows Malicious Websites to Steal Data
27Sep 2023
Oracle bolsters distributed cloud, AI strategy with new Mexico cloud region
26Sep 2023
How to ignite innovation and empower more sustainable solutions
26Sep 2023
Zero Trust: Understanding the US government’s requirements for enhanced cybersecurity
26Sep 2023
Microsoft Adding New Security Features to Windows 11
26Sep 2023
Swiss energy services company uses machine learning to see the future
26Sep 2023
Mitigating mayhem in a complex hybrid IT world
26Sep 2023
SAP prepares to add Joule generative AI copilot across its apps
26Sep 2023
How AI can deliver eye-opening insights for IT
26Sep 2023
5 steps we can take to address the cyber skills shortage
26Sep 2023
UAE-Linked APT Targets Middle East Government With New ‘Deadglyph’ Backdoor
26Sep 2023
$200 Million in Cryptocurrency Stolen in Mixin Network Hack
26Sep 2023
Xenomorph Android Banking Trojan Targeting Users in US, Canada
26Sep 2023
The CISO Carousel and its Effect on Enterprise Cybersecurity
26Sep 2023
Sony Investigating After Hackers Offer to Sell Stolen Data
26Sep 2023
Rediscovering the value of information
26Sep 2023
8 questions CIOs should ask to prime their business for gen AI
26Sep 2023
6 IT rules worth breaking — and how to get away with it
25Sep 2023
Stealthy APT Gelsemium Seen Targeting Southeast Asian Government
25Sep 2023
Nigerian Pleads Guilty in US to Million-Dollar BEC Scheme Role
25Sep 2023
900 US Schools Impacted by MOVEit Hack at National Student Clearinghouse
25Sep 2023
City of Dallas Details Ransomware Attack Impact, Costs
25Sep 2023
Rockwell Automation makes shift to ‘as-a-service’ model
25Sep 2023
10 digital transformation questions every CIO must answer
25Sep 2023
Predator Spyware Delivered to iOS, Android Devices via Zero-Days, MitM Attacks
25Sep 2023
In-the-Wild Exploitation Expected for Critical TeamCity Flaw Allowing Server Takeover
24Sep 2023
Researchers Discover Attempt to Infect Leading Egyptian Opposition Politician With Predator Spyware
22Sep 2023
In Other News: New Analysis of Snowden Files, Yubico Goes Public, Election Hacking
22Sep 2023
China’s Offensive Cyber Operations in Africa Support Soft Power Efforts
22Sep 2023
Air Canada Says Employee Information Accessed in Cyberattack
22Sep 2023
Faster Patching Pace Validates CISA’s KEV Catalog Initiative
22Sep 2023
BIND Updates Patch Two High-Severity DoS Vulnerabilities
22Sep 2023
Top 15 data management platforms available today
22Sep 2023
9 famous analytics and AI disasters
22Sep 2023
Mastercard preps for the post-quantum cybersecurity threat
22Sep 2023
Apple Patches 3 Zero-Days Likely Exploited by Spyware Vendor to Hack iPhones
22Sep 2023
SANS Survey Shows Drop in 2023 ICS/OT Security Budgets
21Sep 2023
Four questions for a casino InfoSec director
21Sep 2023
New ‘Sandman’ APT Group Hitting Telcos With Rare LuaJIT Malware
21Sep 2023
Four Leadership Motions make leading transformative work easier
21Sep 2023
Navigating the Digital Frontier in Cybersecurity Awareness Month 2023
21Sep 2023
Every Network Is Now an OT Network. Can Your Security Keep Up?
21Sep 2023
Legit Security Raises $40 Million in Series B Financing
21Sep 2023
TransUnion Denies Breach After Hacker Publishes Allegedly Stolen Data
21Sep 2023
Car Cybersecurity Study Shows Drop in Critical Vulnerabilities Over Past Decade
21Sep 2023
Atlassian Security Updates Patch High-Severity Vulnerabilities
21Sep 2023
Cisco Boosting Cybersecurity Capabilities With $28 Billion Splunk Acquisition
21Sep 2023
UK’s New Online Safety Law Adds to Crackdown on Big Tech Companies
21Sep 2023
Critical Infrastructure Organizations Warned of Snatch Ransomware Attacks
21Sep 2023
6 deadly sins of enterprise architecture
21Sep 2023
The year’s top 10 enterprise AI trends — so far
21Sep 2023
Omron Patches PLC, Engineering Software Flaws Discovered During ICS Malware Analysis
21Sep 2023
MGM Resorts Computers Back Up After 10 Days as Analysts Eye Effects of Casino Cyberattacks
20Sep 2023
CIOs worry about Gen AI – for all the right reasons
20Sep 2023
So, you’re ready to invest in Universal ZTNA. Here’s what you should know
20Sep 2023
How Zero Trust can help align the CIO and CISO
20Sep 2023
NVIDIA and VMware make AI accessible to enterprises with full-stack accelerated computing
20Sep 2023
Intel Launches New Attestation Service as Part of Trust Authority Portfolio
20Sep 2023
Staying on Topic in an Off Topic World
20Sep 2023
Tor-Based Drug Marketplace Piilopuoti Shut Down by Law Enforcement
20Sep 2023
ServiceNow boasts industry-first gen AI general availability with Vancouver release of Now
20Sep 2023
Atos Unify Vulnerabilities Could Allow Hackers to Backdoor Systems
20Sep 2023
DHS Publishes New Recommendations on Cyber Incident Reporting
20Sep 2023
Discern Security Emerges From Stealth Mode With $3 Million in Funding
20Sep 2023
GitLab Patches Critical Pipeline Execution Vulnerability
20Sep 2023
California Law Restricting Companies’ Use of Information From Kids Online Is Halted by Federal Judge
20Sep 2023
How Mapfre gets cloud to coexist with its tech model ambitions
20Sep 2023
Analyzing the business-case approach Perdue Farms takes to derive value from data
20Sep 2023
5 signs your agile practices will lead to digital disaster
20Sep 2023
SASE Firm Cato Networks Raises $238 Million at $3 Billion Valuation
20Sep 2023
Oracle’s Fusion Cloud CX, ERP, and SCM get generative AI features
20Sep 2023
UK Minister Warns Meta Over End-to-End Encryption
19Sep 2023
CrowdStrike to Acquire Application Intelligence Startup Bionic
19Sep 2023
HiddenLayer Raises Hefty $50M Round for AI Security Tech
19Sep 2023
‘Cybersecurity Incident’ Hits ICC
19Sep 2023
Venafi Leverages Generative AI to Manage Machine Identities
19Sep 2023
The future of ERP: With composable ERP, interoperability and integration are not optional
19Sep 2023
Clorox Blames Damaging Cyberattack for Product Shortage
19Sep 2023
Pakistani APT Uses YouTube-Mimicking RAT to Spy on Android Devices
19Sep 2023
Alcion Raises $21 Million for Backup-as-a-Service Platform
19Sep 2023
Trend Micro Patches Exploited Zero-Day Vulnerability in Endpoint Security Products
19Sep 2023
Thousands of Juniper Appliances Vulnerable to New Exploit
19Sep 2023
Chinese Hackers Target North American, APAC Firms in Web Skimmer Campaign
19Sep 2023
Hacker Conversations: Casey Ellis, Hacker and Ringmaster at Bugcrowd
19Sep 2023
The DX roadmap: David Rogers on driving digital transformation success
19Sep 2023
12 most popular AI use cases in the enterprise today
19Sep 2023
Cybersecurity M&A Roundup for First Half of September 2023
19Sep 2023
CISA Says Owl Labs Vulnerabilities Requiring Close Physical Range Exploited in Attacks
19Sep 2023
Inside Intermax’s ambitious journey to be a sustainable cloud leader
18Sep 2023
The ‘Great Retraining’: IT upskills for the future
18Sep 2023
Microsoft AI Researchers Expose 38TB of Data, Including Keys, Passwords and Internal Messages
18Sep 2023
OT/IoT and OpenTitan, an Open Source Silicon Root of Trust
18Sep 2023
Google Extends Chromebook Lifespan, Promises 10 Years of Automatic Updates
18Sep 2023
Canadian Government Targeted With DDoS Attacks by Pro-Russia Group
18Sep 2023
Fortinet Patches High-Severity Vulnerabilities in FortiOS, FortiProxy, FortiWeb Products
18Sep 2023
Oracle updates Fusion Cloud suites to aid healthcare firms
18Sep 2023
Two Vegas Casinos Fell Victim to Cyberattacks, Shattering the Image of Impenetrable Casino Security
18Sep 2023
TikTok Is Hit With $368 Million Fine Under Europe’s Strict Data Privacy Rules
18Sep 2023
CISA Releases New Identity and Access Management Guidance
18Sep 2023
Verizon accelerates 5G rollouts with automation platform
18Sep 2023
ICS Security Firm Dragos Raises $74 Million in Series D Extension
18Sep 2023
Imagine Making Shadowy Data Brokers Erase Your Personal Info. Californians May Soon Live the Dream
15Sep 2023
VMware Cross-Cloud Managed Services unleash partner capabilities to help customers become cloud smart
15Sep 2023
Extradited Russian Hacker Behind ‘NLBrute’ Malware Pleads Guilty
15Sep 2023
California Settles With Google Over Location Privacy Practices for $93 Million
15Sep 2023
Pentagon’s 2023 Cyber Strategy Focuses on Helping Allies
15Sep 2023
In Other News: China Blames NSA for Hack, AI Jailbreaks, Netography Spin-Off
15Sep 2023
MGM Hackers Broadening Targets, Monetization Strategies
15Sep 2023
Deduce Raises $9 Million to Fight AI-Generated Identity Fraud
15Sep 2023
Salesforce to hire 3,300 staffers as it eyes generative AI opportunity
15Sep 2023
4 key steps for optimizing your IT services portfolio
15Sep 2023
Transforming the leadership trajectory for women in tech
15Sep 2023
Google Feature Blamed for Retool Breach That Led to Cryptocurrency Firm Hacks
15Sep 2023
Inside Nasdaq’s AI-fueled pivot to SaaS provider
14Sep 2023
Microsoft, Oracle deliver direct access to Oracle database services on Azure
14Sep 2023
Caesars Confirms Ransomware Hack, Stolen Loyalty Program Database
14Sep 2023
A Second Major British Police Force Suffers a Cyberattack in Less Than a Month
14Sep 2023
The big speed bump on the road to GenAI
14Sep 2023
A One-Two Punch for Security ROI
14Sep 2023
Kubernetes Vulnerability Leads to Remote Code Execution
14Sep 2023
ICS Computers in Western Countries See Increasing Attacks: Report
14Sep 2023
Azure HDInsight Flaws Allowed Data Access, Session Hijacking, Payload Delivery
14Sep 2023
LockBit Affiliate Deploys New 3AM Ransomware in Recent Attack
14Sep 2023
Ransomware Gang Takes Credit for Disruptive MGM Resorts Cyberattack
14Sep 2023
North Korean Hackers Steal $53 Million in Cryptocurrency From CoinEx
14Sep 2023
CIO Brett Lansing’s five-point approach to building followership
14Sep 2023
What is a data engineer? An analytics role in high demand
14Sep 2023
Tech Industry Leaders Endorse Regulating Artificial Intelligence at Rare Summit in Washington
13Sep 2023
DORA and its impact on data sovereignty
13Sep 2023
AuthMind Scores $8.5M Seed Funding for ITDR Tech
13Sep 2023
CISOs and Board Reporting – an Ongoing Problem
13Sep 2023
Distributed Energy Resources Get Cybersecurity Boost with $39M DOE Funding
13Sep 2023
Why your CEO needs to watch a coding video
13Sep 2023
CISA Releases Open Source Software Security Roadmap
13Sep 2023
How Next-Gen Threats Are Taking a Page From APTs
13Sep 2023
US Agencies Publish Cybersecurity Report on Deepfake Threats
13Sep 2023
Airbus Launches Investigation After Hacker Leaks Data
13Sep 2023
macOS Info-Stealer Malware ‘MetaStealer’ Targeting Businesses
13Sep 2023
China Says No Law Banning iPhone Use in Govt Agencies
13Sep 2023
Salesforce plans generative AI boost for ESG reporting with Net Zero Cloud
13Sep 2023
SecurityWeek to Host Cyber AI & Automation Summit
13Sep 2023
SAP Patches Critical Vulnerability Impacting NetWeaver, S/4HANA
13Sep 2023
CISA Offering Free Vulnerability Scanning Service to Water Utilities
13Sep 2023
Eliminate roles, not people: fine-tuning the talent search during times of change
13Sep 2023
New US CIO appointments, September 2023
13Sep 2023
10 mistakes that can tank IT innovation
13Sep 2023
After Apple and Google, Mozilla Also Patches Zero-Day Exploited for Spyware Delivery
12Sep 2023
The CTO’s newest hat is green
12Sep 2023
The extraordinary synergy of wi-fi and 5G in enterprise networks
12Sep 2023
Zero Day Summer: Microsoft Warns of Fresh New Software Exploits
12Sep 2023
Intel Capital Bets on Zenity for Low-Code/No-Code Security
12Sep 2023
Beyond.pl: Addressing sovereign cloud needs in Poland and beyond
12Sep 2023
Salesforce readies Einstein Copilot to unleash generative AI across its offerings
12Sep 2023
Artificial Intelligence in Cybersecurity: Good or Evil?
12Sep 2023
Adobe Says Critical PDF Reader Zero-Day Being Exploited
12Sep 2023
Zero Trust Security for NIS2 compliance: What you need to know
12Sep 2023
Thousands of Code Packages Vulnerable to Repojacking Attacks
12Sep 2023
Iranian Cyberspies Deployed New Backdoor to 34 Organizations
12Sep 2023
Vector Embeddings – Antidote to Psychotic LLMs and a Cure for Alert Fatigue?
12Sep 2023
ICS Patch Tuesday: Critical CodeMeter Vulnerability Impacts Several Siemens Products
12Sep 2023
China-Linked ‘Redfly’ Group Targeted Power Grid
12Sep 2023
Oracle expects data-hungry generative AI to drive revenue growth
12Sep 2023
Court Convicts Portuguese Hacker in Football Leaks Trial and Gives Him a 4-Year Suspended Sentence
12Sep 2023
Cleafy Raises €10 Million for Online Banking Fraud Prevention Platform
12Sep 2023
Finding Your Way in Cloud Security
12Sep 2023
Schneider Electric leverages AI to help develop employees’ careers
12Sep 2023
7 dark secrets of generative AI
12Sep 2023
DFIR Company Binalyze Raises $19 Million in Series A Funding
12Sep 2023
Google Patches Chrome Zero-Day Reported by Apple, Spyware Hunters
11Sep 2023
Managed services projections increase through 2023
11Sep 2023
MGM Resorts Confirms ‘Cybersecurity Issue’, Shuts Down Systems
11Sep 2023
US Marks 22 Years Since 9/11 Terrorist Attacks
11Sep 2023
Building digital fluency in the C-suite and beyond
11Sep 2023
The digital transformation of an island nation: how Bahrain rose to lead cloud adoption in the GCC Region
11Sep 2023
After Microsoft and X, Hackers Launch DDoS Attack on Telegram
11Sep 2023
Associated Press Stylebook Users Targeted in Phishing Attack Following Data Breach
11Sep 2023
Bookstore Chain Dymocks Discloses Data Breach Possibly Impacting 800k Customers
11Sep 2023
Spies, Hackers, Informants: How China Snoops on the West
11Sep 2023
FBI Blames North Korean Hackers for $41 Million Stake.com Heist
11Sep 2023
What is SAFe? A framework for scaling business agility
11Sep 2023
Vulnerabilities Allow Hackers to Hijack, Disrupt Socomec UPS Devices
10Sep 2023
Powerful Ethnic Militia in Myanmar Repatriates 1,200 Chinese Suspected of Involvement in Cybercrime
08Sep 2023
Governance for responsible AI: The easy things and the hard ones
08Sep 2023
Cisco ASA Zero-Day Exploited in Akira Ransomware Attacks
08Sep 2023
In Other News: LastPass Vault Hacking, Russia Targets Ukraine Energy Facility, NXP Breach
08Sep 2023
New Phishing Campaign Launched via Google Looker Studio
08Sep 2023
Emsisoft Tells Users to Update Products, Reboot Systems Due to Certificate Mishap
08Sep 2023
J&J enlists AI to streamline joint replacement surgery
08Sep 2023
Is AI in the enterprise ready for primetime? Not yet.
08Sep 2023
US Aeronautical Organization Hacked via Zoho, Fortinet Vulnerabilities
08Sep 2023
US, UK Sanction More Members of Trickbot Russian Cybercrime Group
07Sep 2023
Apple Patches Actively Exploited iOS, macOS Zero-Days
07Sep 2023
SAP to buy LeanIX to advance process optimization with AI
07Sep 2023
Rigged Software and Zero-Days: North Korean APT Caught Hacking Security Researchers
07Sep 2023
3 keys to boosting your engineering culture
07Sep 2023
Generative AI: Balancing security with innovation
07Sep 2023
7 ways to ensure the success of product-centric reliability
07Sep 2023
How product-centric engineering has revolutionized Discover
07Sep 2023
Fostering Innovation at Discover Financial Services
07Sep 2023
The multi-cloud era – a faster path forward for enterprises and Managed Services Providers
07Sep 2023
Wealthy Russian With Kremlin Ties Gets 9 Years in Prison for Hacking and Insider Trading Scheme
07Sep 2023
Generative AI’s potential as a force multiplier in defense
07Sep 2023
The Team8 Foundry Method for Selecting Investable Startups
07Sep 2023
See Tickets Alerts 300,000 Customers After Another Web Skimmer Attack
07Sep 2023
‘Atomic macOS Stealer’ Malware Delivered via Malvertising Campaign
07Sep 2023
CISA Releases Guidance on Adopting DDoS Mitigations
07Sep 2023
Tenable to Acquire Cloud Security Firm Ermetic for $240 Million
07Sep 2023
Cisco Patches Critical Vulnerability in BroadWorks Platform
07Sep 2023
Make SASE your cybersecurity armor – but don’t go it alone
07Sep 2023
Cisco Finds 8 Vulnerabilities in OAS Industrial IoT Data Platform
07Sep 2023
Briefing the board on AI: Educate to tee up investment
07Sep 2023
What AI already does well in supply chain management
07Sep 2023
IBM Discloses Data Breach Impacting Janssen Healthcare Platform
06Sep 2023
Crash Dump Error: How a Chinese Espionage Group Exploited Microsoft’s Errors
06Sep 2023
Cash-Strapped IronNet Faces Bankruptcy Options
06Sep 2023
Price shock: IBM to increase cloud costs by up to 26% in 2024
06Sep 2023
Lessons from the field: How Generative AI is shaping software development in 2023
06Sep 2023
Investors Betting Big on Upwind for CNAPP Tech
06Sep 2023
Webinar Tomorrow: Unpacking the Secure Supply Chain Consumption Framework (S2C2F)
06Sep 2023
Dozens of Unpatched Flaws Expose Security Cameras Made by Defunct Company Zavio
06Sep 2023
Thousands of Popular Websites Leaking Secrets
06Sep 2023
Is an integrated ERP suite or a composable ERP strategy right for you?
06Sep 2023
Password-Stealing Chrome Extension Demonstrates New Vulnerabilities
06Sep 2023
25 Major Car Brands Get Failing Marks From Mozilla for Security and Privacy
06Sep 2023
Android Zero-Day Patched With September 2023 Security Updates
06Sep 2023
Chrome 116 Update Patches High-Severity Vulnerabilities
06Sep 2023
Hacker Conversations: Alex Ionescu
06Sep 2023
AI is the boost Mercedes-Benz needs to digitally transform
06Sep 2023
7 tough IT security discussions every IT leader must have
06Sep 2023
AtlasVPN to Patch IP Leak Vulnerability After Public Disclosure
06Sep 2023
United Airlines Says the Outage That Held Up Departing Flights Was Not a Cybersecurity Issue
05Sep 2023
Orro: Delivering a sustainable future enabled by the cloud
05Sep 2023
3 hard truths about the multi‑cloud journey
05Sep 2023
How Hackergal is building the talent pipeline of the future
05Sep 2023
How to get the most out of this transformative moment for business technology
05Sep 2023
CISA Hires ‘Mudge’ to Work on Security-by-Design Principles
05Sep 2023
Controlling cloud chaos: How to realign IT with the business
05Sep 2023
MITRE and CISA Release Open Source Tool for OT Attack Emulation
05Sep 2023
9 Vulnerabilities Patched in SEL Power System Management Products
05Sep 2023
7 Million Users Possibly Impacted by Freecycle Data Breach
05Sep 2023
Okta Says US Customers Targeted in Sophisticated Attacks
05Sep 2023
Norfolk Southern Says a Software Defect — Not a Hacker — Forced It to Park Its Trains This Week
05Sep 2023
The ‘IT Business Office’: Doing IT’s admin work right
05Sep 2023
Estée Lauder applies AI, AR for cosmetics accessibility
05Sep 2023
6 signs an IT manager is struggling — and how to help
05Sep 2023
Ransomware Attack on Fencing Systems Maker Zaun Impacts UK Military Data
05Sep 2023
Cybersecurity M&A Roundup: 40 Deals Announced in August 2023
05Sep 2023
Developers Warned of Malicious PyPI, NPM, Ruby Packages Targeting Macs
01Sep 2023
Exploit Code Published for Critical-Severity VMware Security Defect
01Sep 2023
How Accenture’s solution erases the blind spots of services spend management
01Sep 2023
How to make your developer organization more efficient
01Sep 2023
SAP poaches Microsoft exec as its new global head of AI
01Sep 2023
In Other News: Hacking Encrypted Linux Computers, Android Fuzzing, Skype Leaking IPs
01Sep 2023
Elon Musk Says X, Formerly Twitter, Will Have Voice and Video Calls, Updates Privacy Policy
01Sep 2023
Free Decryptor Available for ‘Key Group’ Ransomware
01Sep 2023
Continuous learning gives U.S. Bank a technology talent edge
01Sep 2023
How Nvidia became a trillion-dollar company
01Sep 2023
Intel embraces SDN to modernize its chip factories
01Sep 2023
Threat Actors Adopt, Modify Open Source ‘SapphireStealer’ Information Stealer
01Sep 2023
Industry Reactions to Qakbot Botnet Disruption: Feedback Friday
01Sep 2023
Over $1 Million Offered at New Pwn2Own Automotive Hacking Contest
01Sep 2023
Sourcegraph Discloses Data Breach Following Access Token Leak
31Aug 2023
IFS acquires Falkonry to offer AI-based enterprise asset management services
31Aug 2023
How prioritizing training and mentorship retains talent
31Aug 2023
Busting 4 common SD-WAN misconceptions
31Aug 2023
Energy Department Offering $9M in Cybersecurity Competition for Small Electric Utilities
31Aug 2023
Vulnerability in WordPress Migration Plugin Exposes Websites to Attacks
31Aug 2023
Five Eyes Report: New Russian Malware Targeting Ukrainian Military Android Devices
31Aug 2023
Apple Preparing iPhone 14 Pro Phones for 2024 Security Research Device Program
31Aug 2023
PenFed to bank on gen AI for hyper-personalization
31Aug 2023
Splunk Patches High-Severity Flaws in Enterprise, IT Service Intelligence
31Aug 2023
Giant Eagle CIO Kirk Ball’s recipe for digital transformation success
31Aug 2023
Boeing CIO Susan Doniz leads with curiosity and empathy
31Aug 2023
Lawsuit Accuses University of Minnesota of Not Doing Enough to Prevent Data Breach
31Aug 2023
Dangling DNS Used to Hijack Subdomains of Major Organizations
31Aug 2023
500k Impacted by Data Breach at Fashion Retailer Forever 21
30Aug 2023
CIOs are worried about the informal rise of generative AI in the enterprise
30Aug 2023
What motivated Ericsson’s big push into the cloud
30Aug 2023
‘Earth Estries’ Cyberespionage Group Targets Government, Tech Sectors
30Aug 2023
Healthcare Organizations Hit by Cyberattacks Last Year Reported Big Impact, Costs
30Aug 2023
Recent Juniper Flaws Chained in Attacks Following PoC Exploit Publication
30Aug 2023
DreamBus Botnet Exploiting RocketMQ Vulnerability to Delivery Cryptocurrency Miner
30Aug 2023
How Quantum Computing Will Impact Cybersecurity
30Aug 2023
BGP Flaw Can Be Exploited for Prolonged Internet Outages
30Aug 2023
GitHub Enterprise Server Gets New Security Capabilities
30Aug 2023
The portfolio approach to digital transformation: 4 keys to success
30Aug 2023
Fianu Labs Emerges From Stealth With $2 Million in Seed Funding
30Aug 2023
High-Severity Memory Corruption Vulnerabilities Patched in Firefox, Chrome
29Aug 2023
Operation ‘Duck Hunt’: Qakbot Malware Disrupted, $8.6 Million in Cryptocurrency Seized
29Aug 2023
If you’re still focusing on capacity planning, maybe you’re doing VSM wrong
29Aug 2023
VMware Patches Major Security Flaws in Network Monitoring Product
29Aug 2023
New ‘MMRat’ Android Trojan Targeting Users in Southeast Asia
29Aug 2023
TeraSky—Providing award-winning infrastructure modernization solutions with VMware
29Aug 2023
OpenAI Turns to Security to Sell ChatGPT Enterprise
29Aug 2023
Accelerate change with Value Stream Management
29Aug 2023
IBM – Putting technology to work in the real world
29Aug 2023
Did Microsoft Just Upend the Enterprise Browser Market?
29Aug 2023
The Reality of Cyberinsurance in 2023
29Aug 2023
BMC Helix: Leading the charge in Generative AI-driven enterprise service management
29Aug 2023
Meta Fights Sprawling Chinese ‘Spamouflage’ Operation
29Aug 2023
Chinese APT Was Prepared for Remediation Efforts in Barracuda ESG Zero-Day Attack
29Aug 2023
UN Warns Hundreds of Thousands in Southeast Asia Roped Into Online Scams
29Aug 2023
Security Team Huddle: Using the Full NIST Cybersecurity Framework for the Win
29Aug 2023
Personal, Health Information of 1.2 Million Stolen in PurFoods Ransomware Attack
29Aug 2023
Your AI journey: Destined for the ditch?
29Aug 2023
6 trends fueling the rise of self-service IT
28Aug 2023
Telefonica is working to help enterprises decarbonize their operations
28Aug 2023
Discovery Holdings explores the opportunities of multi-cloud without the complexity
28Aug 2023
Equinix goes partner prospecting with AI
28Aug 2023
Digital mining for sustainability in a low-carbon economy
28Aug 2023
P&G enlists IoT, predictive analytics to perfect Pampers diapers
28Aug 2023
How a unified approach to support and services can improve IT outcomes
28Aug 2023
Acquisition Chatter Swirls Around SentinelOne, BlackBerry
28Aug 2023
Signs of Malware Attack Targeting Rust Developers Found on Crates.io
28Aug 2023
10 Million Likely Impacted by Data Breach at French Unemployment Agency
28Aug 2023
Two Men Arrested Following Poland Railway Hacking
28Aug 2023
3 Malware Loaders Detected in 80% of Attacks: Security Firm
28Aug 2023
Leaseweb Reports Cloud Disruptions Due to Cyberattack
28Aug 2023
Agile project management: Principles, benefits, tools, tips, and when to make the switch
28Aug 2023
2023 CIO Hall of Fame inductees on building a successful IT leadership career
28Aug 2023
Ohio History Organization Says Personal Information Stolen in Ransomware Attack
28Aug 2023
3 Cryptocurrency Firms Suffer Data Breach After Kroll SIM Swapping Attack
25Aug 2023
The four Es of AI: Keeping up with the trend that never sleeps
25Aug 2023
Dear SAP Support – We’ve Grown Apart
25Aug 2023
In Other News: Africa Cybercrime Crackdown, Unpatched macOS Flaw, Investor Disclosures
25Aug 2023
Health check on Tech: CK Birla Hospitals CIO Mitali Biswas on moving the needle towards innovation
25Aug 2023
North Korean APT Hacks Internet Infrastructure Provider via ManageEngine Flaw
25Aug 2023
Europe is Cracking Down on Big Tech. This Is What Will Change When You Sign On
25Aug 2023
Lawmaker Wants Federal Contractors to Have Vulnerability Disclosure Policies
25Aug 2023
Cypago Raises $13 Million for GRC Automation Platform
25Aug 2023
Google Workspace Introduces New AI-Powered Security Controls
25Aug 2023
Nearly 1,000 Organizations, 60 Million Individuals Impacted by MOVEit Hack
24Aug 2023
Chinese-backed APT ‘Flax Typhoon’ Hacks Taiwan with Minimal Malware Footprint
24Aug 2023
Regulatory uncertainty overshadows gen AI despite pace of adoption
24Aug 2023
University of Minnesota Confirms Data Breach, Says Ransomware Not Involved
24Aug 2023
Financial IT leaders prep for a quantum-fueled future
24Aug 2023
Mysterious Malware Uses Wi-Fi Scanning to Get Location of Infected Device
24Aug 2023
Cisco Patches Vulnerabilities Exposing Switches, Firewalls to DoS Attacks
24Aug 2023
FBI: Patches for Recent Barracuda ESG Zero-Day Ineffective
24Aug 2023
Generative AI is electrifying. Charge ahead or get shocked.
24Aug 2023
Rockwell ThinManager Vulnerabilities Could Expose Industrial HMIs to Attacks
24Aug 2023
UK Court Concludes Teenager Behind Huge Hacking Campaign
24Aug 2023
Hosting Provider CloudNordic Loses All Customer Data in Ransomware Attack
24Aug 2023
Traders Targeted by Cybercriminals in Attack Exploiting WinRAR Zero-Day
24Aug 2023
Digital Identity Protection Firm SpyCloud Raises $110 Million
24Aug 2023
CIO Anurag Gupta on taking the private equity plunge
23Aug 2023
AIOps for successful IoT projects
23Aug 2023
Data soup and the art of finding relevance: Why AIOps isn’t enough for modern network monitoring
23Aug 2023
Thoma Bravo Merges ForgeRock with Ping Identity
23Aug 2023
Cybersecurity Companies Report Surge in Ransomware Attacks
23Aug 2023
FBI Finds 1,580 Bitcoin in Crypto Wallets Linked to North Korean Hackers
23Aug 2023
Smart Cities: Utopian Dream, Security Nightmare, or Political Gimmick?
23Aug 2023
3,000 Openfire Servers Exposed to Attacks Targeting Recent Vulnerability
23Aug 2023
The End of “Groundhog Day” for the Security in the Boardroom Discussion?
23Aug 2023
US Government Publishes Guidance on Migrating to Post-Quantum Cryptography
23Aug 2023
Google opens second cloud region in Germany
23Aug 2023
Examining Cargill’s push to nurture growth through digital and data strategies
23Aug 2023
How Huber spurs innovation in a historically decentralized business
23Aug 2023
First Weekly Chrome Security Update Patches High-Severity Vulnerabilities
23Aug 2023
Exploitation of Ivanti Sentry Zero-Day Confirmed
22Aug 2023
7 project priority checks for overloaded IT agendas
22Aug 2023
Atos—Powering Digital Transformation Across the Customer Lifecycle
22Aug 2023
Safeguarding your digital ecosystem: effective strategies to detect and mitigate API abuse
22Aug 2023
How Vodafone automated sales and operations management
22Aug 2023
US Military Targeted in Recent HiatusRAT Attack
22Aug 2023
Hacker Conversations: Cris Thomas (AKA Space Rogue) From Lopht Heavy Industries
22Aug 2023
TP-Link Smart Bulb Vulnerabilities Expose Households to Hacker Attacks
22Aug 2023
Ransomware Group Starts Leaking Data From Japanese Watchmaking Giant Seiko
22Aug 2023
Australian Energy Software Firm Energy One Hit by Cyberattack
22Aug 2023
Grip Security Lands $41 Million Series B Financing
22Aug 2023
New ‘Carderbee’ APT Targeted Chinese Security Software in Supply Chain Attack
22Aug 2023
Lenovo’s Arthur Hu on the CIO’s customer-centric imperative
22Aug 2023
3 key roles for driving digital success
22Aug 2023
CISA Warns of Another Exploited Adobe ColdFusion Vulnerability
22Aug 2023
Cerby Raises $17 Million for Access Management Platform for Nonstandard Applications
21Aug 2023
Fujitsu – Transforming business and society in the digital age
21Aug 2023
Ivanti Ships Urgent Patch for API Authentication Bypass Vulnerability
21Aug 2023
One company’s innovation reduces carbon footprint – while expanding digital impression
21Aug 2023
How to build a next-gen workforce
21Aug 2023
Researchers Uncover Real Identity of CypherRAT and CraxsRAT Malware Developer
21Aug 2023
Australian Lender Latitude Financial Reports AU$76 Million Cyberattack Costs
21Aug 2023
Flaws in Juniper Switches and Firewalls Can Be Chained for Remote Code Execution
21Aug 2023
Brazilian Hacker Claims Bolsonaro Asked Him to Hack Into the Voting System Ahead of 2022 Vote
21Aug 2023
Webinar Tomorrow: ZTNA Superpowers CISOs Should Know
21Aug 2023
US Gov Warns of Foreign Intelligence Cyberattacks Against US Space Industry
21Aug 2023
J&J’s Jim Swanson brings mission-driven leadership to the CIO role
21Aug 2023
The 4 most overhyped technologies in IT
21Aug 2023
Tesla Discloses Data Breach Related to Whistleblower Leak
20Aug 2023
Suspected N. Korean Hackers Target S. Korea-US Drills
18Aug 2023
How plusserver strengthens cloud capabilities and helps enterprises reduce their carbon footprint
18Aug 2023
Three technology pain points to address for your employees
18Aug 2023
Jenkins Patches High-Severity Vulnerabilities in Multiple Plugins
18Aug 2023
In Other News: US Hacking China, Unfixed PowerShell Gallery Flaws, Free Train Tickets
18Aug 2023
Lilly revolutionizes clinical trials with intelligent sensor cloud
18Aug 2023
Stealthy ‘LabRat’ Campaign Abuses TryCloudflare to Hide Infrastructure
18Aug 2023
Money Matters: Director – IT and CISO Pushkal Tenjerla of CMS on digital revolution in cash management systems
18Aug 2023
Federally Insured Credit Unions Required to Report Cyber Incidents Within 3 Days
18Aug 2023
Israel, US to Invest $4 Million in Critical Infrastructure Security Projects
18Aug 2023
Companies Respond to ‘Downfall’ Intel CPU Vulnerability
18Aug 2023
5 rules that transform outsourcing outcomes
17Aug 2023
ProjectDiscovery Lands $25M Investment for Cloud Security Tech
17Aug 2023
The CIO’s call to action on gen AI
17Aug 2023
Google Brings AI Magic to Fuzz Testing With Eye-Opening Results
17Aug 2023
Industrial modernization: Becoming future-ready in uncertain times
17Aug 2023
Rapid7 Says ROI for Ransomware Remains High; Zero-Day Usage Expands
17Aug 2023
Cisco Patches High-Severity Vulnerabilities in Enterprise Applications
17Aug 2023
Malicious QR Codes Used in Phishing Attack Targeting US Energy Company
17Aug 2023
CISA Releases Cyber Defense Plan to Reduce RMM Software Risks
17Aug 2023
Thousands of Systems Turned Into Proxy Exit Nodes via Malware
17Aug 2023
Tech leaders weigh in on the upside and flipside of generative AI
17Aug 2023
What The Clover Group does to address legacy-related challenges
17Aug 2023
Cybersecurity M&A Roundup for August 1-15, 2023
17Aug 2023
Exploitation of Citrix ShareFile Vulnerability Spikes as CISA Issues Warning
16Aug 2023
Google Releases Security Key Implementation Resilient to Quantum Attacks
16Aug 2023
Ivanti Patches Critical Vulnerability in Avalanche Enterprise MDM Solution
16Aug 2023
Cleaning Products Giant Clorox Takes Systems Offline Following Cyberattack
16Aug 2023
GitHub Paid Out $1.5 Million in Bug Bounties in 2022
16Aug 2023
Chrome 116 Patches 26 Vulnerabilities
16Aug 2023
How Svevia connects roads, risk, and refuse through the cloud
16Aug 2023
Introducing the GenAI models you haven’t heard of yet
16Aug 2023
CIO 100 Award winners prove the transformative value of IT
15Aug 2023
Silicon powers democratized networking
15Aug 2023
2,000 Citrix NetScaler Instances Backdoored via Recent Vulnerability
15Aug 2023
ESM: Delight employees with personalized, accessible digital experiences
15Aug 2023
Hacker Forum Credentials Found on 120,000 PCs Infected With Info-Stealer Malware
15Aug 2023
CISO Conversations: CISOs in Cloud-based Services Discuss the Process of Leadership
15Aug 2023
SecureWorks Laying Off 15% of Employees
15Aug 2023
1.5 Million Impacted by Ransomware Attack at Canadian Dental Service
15Aug 2023
Los Angeles IT secures the vote with open source and the cloud
15Aug 2023
Digi-Key: Creating magic with multi-cloud
14Aug 2023
Colorado Health Agency Says 4 Million Impacted by MOVEit Hack
14Aug 2023
comdivision – Cloud expertise from design to deployment and management
14Aug 2023
Rackspace technology—Award-winning, multi-cloud modernization powered by VMware
14Aug 2023
Huabao sniffs out the ultimate efficiency formula
14Aug 2023
US Shuts Down Bulletproof Hosting Service LolekHosted, Charges Its Polish Operator
14Aug 2023
Power Management Product Flaws Can Expose Data Centers to Damaging Attacks, Spying
14Aug 2023
US Cyber Safety Board to Review Cloud Attacks
14Aug 2023
Email – The System Running Since 71’
14Aug 2023
Cherokee Nation empowers its citizens with IT
14Aug 2023
Micro transformation: Driving big business benefit through quick IT wins
14Aug 2023
Iagona ScrutisWeb Vulnerabilities Could Expose ATMs to Remote Hacking
14Aug 2023
Ford Says Wi-Fi Vulnerability Not a Safety Risk to Vehicles
14Aug 2023
Don’t Expect Quick Fixes in ‘Red-Teaming’ of AI Models. Security Was an Afterthought
11Aug 2023
The best of the best: Inside this year’s CSO50 Awards
11Aug 2023
Enhancing healthcare data privacy & access: the power of tokenization
11Aug 2023
In Other News: macOS Security Reports, Keyboard Spying, VPN Vulnerabilities
11Aug 2023
Northern Ireland’s Top Police Officer Apologizes for ‘Industrial Scale’ Data Breach
11Aug 2023
Microsoft Discloses Codesys Flaws Allowing Shutdown of Industrial Operations, Spying
11Aug 2023
Black Hat USA 2023 – Announcements Summary
11Aug 2023
Rethinking data analytics as a digital-first driver at Dow
11Aug 2023
What is NLP? Natural language processing explained
11Aug 2023
India Passes Data Protection Legislation in Parliament. Critics Fear Privacy Violation
11Aug 2023
MoustachedBouncer: Foreign Embassies in Belarus Likely Targeted via ISPs
10Aug 2023
Check Point to Acquire SASE Security Firm Perimeter 81 for $490 Million
10Aug 2023
How IT does business at Eastman
10Aug 2023
Turkcell Cloud: Bringing sovereign cloud to Turkey’s regulated industries
10Aug 2023
Symmetry Systems Raises $17.7M for Data Security Posture Management Platform
10Aug 2023
Managing and Securing Distributed Cloud Environments
10Aug 2023
European Startup Pistachio Raises €3.25 Million for Cybersecurity Training Platform
10Aug 2023
6 legal ‘gotchas’ that could sink your CIO career
10Aug 2023
CISA Warns Organizations of Exploited Vulnerability Affecting .NET, Visual Studio
09Aug 2023
Western Digital, Synology NAS Vulnerabilities Exposed Millions of Users’ Files
09Aug 2023
White House Offers Prize Money for Hacker-Thwarting AI
09Aug 2023
What executives should know about CNAPP
09Aug 2023
PepsiCo IT redefines direct-to-store business model success
09Aug 2023
Oracle adds compute services to its Cloud@Customer offering
09Aug 2023
Accelerating generative AI requires the right storage
09Aug 2023
Microsoft Paid Out $13 Million via Bug Bounty Programs for Fourth Consecutive Year
09Aug 2023
Sweet Security Emerges From Stealth With $12 Million Seed Funding and a Cloud Runtime Solution
09Aug 2023
Intel Addresses 80 Firmware, Software Vulnerabilities
09Aug 2023
Cloud Security Firm Kivera Raises $3.5 Million in Seed Funding
09Aug 2023
Automated Security Control Assessment: When Self-Awareness Matters
09Aug 2023
Examining the National Bank of Canada CIO’s approach to tech and teams
09Aug 2023
What is digital transformation? A necessary disruption
09Aug 2023
SAP Patches Critical Vulnerability in PowerDesigner Product
09Aug 2023
40 Vulnerabilities Patched in Android With August 2023 Security Updates
09Aug 2023
New ‘Inception’ Side-Channel Attack Targets AMD Processors
09Aug 2023
Full Steam Ahead: CIO Kopal Raj of WABTEC India on staying ‘on-track’ with AI, IoT and sustainability goals
09Aug 2023
Downfall: New Intel CPU Attack Exposing Sensitive Information
09Aug 2023
Rapid7 Announces Layoffs, Office Closings Under Restructuring Plan
08Aug 2023
Edge Computing: a powerful enabler for industrial frontline workers
08Aug 2023
Patch Tuesday: Microsoft (Finally) Patches Exploited Office Zero-Days
08Aug 2023
Patch Tuesday: Adobe Patches 30 Acrobat, Reader Vulns
08Aug 2023
White House Holds First-Ever Summit on the Ransomware Crisis Plaguing the Nation’s Public Schools
08Aug 2023
Nvidia unveils Workbench for managing AI workloads, updates Omniverse
08Aug 2023
Horizon3 AI Raises $40 Million to Expand Automated Pentesting Platform
08Aug 2023
Protection is No Longer Straightforward – Why More Cybersecurity Solutions Must Incorporate Context
08Aug 2023
ICS Patch Tuesday: Siemens Fixes 7 Vulnerabilities in Ruggedcom Products
08Aug 2023
Identity-Based Attacks Soared in Past Year: Report
08Aug 2023
Black Hat Preview: The Business of Cyber Takes Center Stage
08Aug 2023
UK Think Tank Proposes Greater Ransomware Reporting From Cyberinsurance to Government
08Aug 2023
6 ways CIOs sabotage their IT consultant’s success
08Aug 2023
Microsoft Shares Guidance and Resources for AI Red Teams
08Aug 2023
The great reconciliation: Mitigating technical debt
08Aug 2023
The July 2023 Multi-Cloud Briefing: Generative AI for the Enterprise
08Aug 2023
Unlocking the hidden value of data
08Aug 2023
Efficiency is the name of the game for IT leaders
08Aug 2023
IT leaders know they need to manage IT risk—but need help in execution
07Aug 2023
HPE—Taking an award-winning approach to overcome customer modernization challenges
07Aug 2023
Softchoice—delivering award-winning, end-to-end multi-cloud strategies
07Aug 2023
Wipro — Innovating modern multi-cloud environments for digital transformation
07Aug 2023
4 questions CIOs are asking about cloud computing
07Aug 2023
Cyberinsurance Firm Resilience Raises $100 Million to Expand Its Cyber Risk Platform
07Aug 2023
Groundbreaking HR solution earns BT Group unique SAP Innovation Award honor
07Aug 2023
North Korean Hackers Targeted Russian Missile Developer
07Aug 2023
New PaperCut Vulnerability Allows Remote Code Execution
07Aug 2023
CISA Unveils Cybersecurity Strategic Plan for Next 3 Years
07Aug 2023
Generative AI is a make-or-break moment for CIOs
07Aug 2023
IDC: Pace of enterprise applications sales will increase next year
07Aug 2023
IT leaders embrace the role of business change maker
07Aug 2023
Colorado Department of Higher Education Discloses Ransomware Attack, Data Breach
04Aug 2023
A Cyberattack Has Disrupted Hospitals and Health Care in Five States
04Aug 2023
In Other News: Cybersecurity Funding Rebounds, Cloud Threats, BeyondTrust Vulnerability
04Aug 2023
Microsoft Criticized Over Handling of Critical Power Platform Vulnerability
04Aug 2023
Threat Actors Abuse Cloudflare Tunnel for Persistent Access, Data Theft
04Aug 2023
Points.com Vulnerabilities Allowed Customer Data Theft, Rewards Program Hacking
04Aug 2023
AWS hopes for a savior in AI as revenue growth continues to slow
04Aug 2023
New York Couple Plead Guilty to Bitcoin Laundering
04Aug 2023
What is an automation engineer? A growing role to address IT automation
04Aug 2023
A 4-pronged strategy to cut SaaS sprawl
04Aug 2023
4 ways to ask hard questions about emerging tech risks
04Aug 2023
Exploitation of Ivanti EPMM Flaw Picking Up as New Vulnerability Is Disclosed
04Aug 2023
Five Eyes Agencies Call Attention to Most Frequently Exploited Vulnerabilities
03Aug 2023
CISA Calls Urgent Attention to UEFI Attack Surfaces
03Aug 2023
670 ICS Vulnerabilities Disclosed by CISA in First Half of 2023: Analysis
03Aug 2023
Jericho Security Raises $3 Million for Awareness Training Powered by Generative AI
03Aug 2023
Dozens of RCE Vulnerabilities Impact Milesight Industrial Router
03Aug 2023
Decommissioned Medical Infusion Pumps Expose Wi-Fi Configuration Data
03Aug 2023
These Are the Top Five Cloud Security Risks, Qualys Says
03Aug 2023
NASA, IBM team up to build LLM that can help fight climate change
03Aug 2023
CIO legend Chris Hjelm on developing future-ready IT leaders
03Aug 2023
Lay the groundwork now for advanced analytics and AI
03Aug 2023
Google Awards Over $60,000 for V8 Vulnerabilities Patched With Chrome 115 Update
03Aug 2023
Cybersecurity M&A Roundup: 42 Deals Announced in July 2023
03Aug 2023
Salesforce Email Service Zero-Day Exploited in Phishing Campaign
03Aug 2023
Software Supply Chain Startup Endor Labs Scores Massive $70M Series A Round
02Aug 2023
Beyond compliance: How to pick winning ESG strategies that make a splash
02Aug 2023
Adapt to Changing Regulations with Data Independence and Mobility
02Aug 2023
Microsoft Catches Russian Government Hackers Phishing with Teams Chat App
02Aug 2023
Improving visibility and security in hybrid cloud environments
02Aug 2023
Answer these 4 questions to maximize the ROI of your security toolset
02Aug 2023
Shield and Visibility Solutions Target Phishing From Inside the Browser
02Aug 2023
Revolutionize your site for growth, innovation, and customer satisfaction with composable architecture
02Aug 2023
New hVNC macOS Malware Advertised on Hacker Forum
02Aug 2023
Cyble Raises $24 Million for AI-Powered Threat Intelligence Platform
02Aug 2023
Salesforce launches Starter to ward off competition in the SMB segment
02Aug 2023
Google AMP Abused in Phishing Attacks Aimed at Enterprise Users
02Aug 2023
Firefox 116 Patches High-Severity Vulnerabilities
02Aug 2023
Enterprises enthusiastic about generative AI, Foundry survey shows
02Aug 2023
CIO Ryan Snyder on the benefits of interpreting data as a layer cake
02Aug 2023
10 tips for modernizing legacy apps for the cloud
02Aug 2023
Ivanti Zero-Day Exploited by APT Since at Least April in Norwegian Government Attack
01Aug 2023
Broadcom’s Approach Towards Delivering Customer Value
01Aug 2023
How innovative modular UPSs support digital transformation at edge computing sites
01Aug 2023
Forgepoint Capital Places $20M Series A Bet on Converge Insurance
01Aug 2023
Iran-Run ISP ‘Cloudzy’ Caught Supporting Nation-State APTs, Cybercrime Hacking Groups
01Aug 2023
Nearly All Modern CPUs Leak Data to New Collide+Power Side-Channel Attack
01Aug 2023
Socket Scores $20M as Investors Bet on Software Supply Chain Security Startups
01Aug 2023
This is the easiest AI strategy decision you’ll ever make
01Aug 2023
SpecterOps Updates BloodHound Active Directory Mapping Tool
01Aug 2023
Silk Security Emerges from Stealth With $12.5 Million Seed Funding
01Aug 2023
Nile Raises $175 Million for Secure NaaS Solutions
01Aug 2023
Hacker Conversations: Youssef Sammouda, Bug Bounty Hunter
01Aug 2023
Generative AI usage gains traction among enterprises: McKinsey
01Aug 2023
Invoking IT to help revitalize Indigenous languages at risk of extinction
01Aug 2023
Hyperscalers in crosshairs for anti-competitive pricing and lock-in
01Aug 2023
How generative AI impacts your digital transformation priorities
01Aug 2023
Bedding Giant Tempur Sealy Takes Systems Offline Following Cyberattack
01Aug 2023
Ransomware Attacks on Industrial Organizations Doubled in Past Year: Report
01Aug 2023
200 Canon Printer Models May Expose Wi-Fi Connection Data
01Aug 2023
Possible Chinese Malware in US Systems a ‘Ticking Time Bomb’: Report
31Jul 2023
US Gov Rolls Out National Cyber Workforce, Education Strategy
31Jul 2023
Why Zain Kuwait partnered with BMC Software: An ongoing commitment to service management excellence
31Jul 2023
Simplifying IT strategy: How to avoid the annual planning panic
31Jul 2023
How Bloomberg’s engineers built a culture of knowledge sharing
31Jul 2023
Stack Overflow announces OverflowAI
31Jul 2023
Paper-to-Digital Can Drive Sustainability at Scale
31Jul 2023
Why knowledge management is foundational to AI success
31Jul 2023
The hardest part of building software is not coding, it’s requirements
31Jul 2023
BIT’s Agrobit named a ‘Hero of Sustainability’ at SAP Innovation Awards
31Jul 2023
Atea – Enabling organizations to tame complexity, manage growth
31Jul 2023
Building a Beautiful Data Lakehouse
31Jul 2023
Reddit Taps Fredrick ‘Flee’ Lee for CISO Job
31Jul 2023
Apple Lists APIs That Developers Can Only Use for Good Reason
31Jul 2023
Huawei Unleashes the Power of Technology for a Sustainable, Digital Europe
31Jul 2023
Swiss Re streamlines insurers’ natural disaster response with AI
31Jul 2023
20 issues shaping generative AI strategies today
31Jul 2023
CISA Analyzes Malware Used in Barracuda ESG Attacks
31Jul 2023
Second Ivanti EPMM Zero-Day Vulnerability Exploited in Targeted Attacks
31Jul 2023
Building a successful platform engineering practice
28Jul 2023
5 steps to drive and foster innovation in IT
28Jul 2023
In Other News: Data Breach Cost Rises, Russia Targets Diplomats, Tracker Alerts in Android
28Jul 2023
US, Australia Issue Warning Over Access Control Vulnerabilities in Web Applications
28Jul 2023
How much advantage does edge offer? And how are organizations using it?
28Jul 2023
Exploitation of Recent Citrix ShareFile RCE Vulnerability Begins
28Jul 2023
Industry Reactions to New SEC Cyber Incident Disclosure Rules: Feedback Friday
28Jul 2023
Zimbra Patches Exploited Zero-Day Vulnerability
28Jul 2023
Embracing neurodiversity in IT for competitive advantage
28Jul 2023
JLL reinvents itself for the AI era
28Jul 2023
Weintek Weincloud Vulnerabilities Allowed Manipulation, Damaging of ICS Devices
28Jul 2023