04Dec 2023

ICS at Multiple US Water Facilities Targeted by Hackers Affiliated With Iranian Government

04Dec 2023ICS at Multiple US Water Facilities Targeted by Hackers Affiliated With Iranian Government04 Dec 2023UncategorizedAdmin04Dec 2023ICS at Multiple US Water Facilities Targeted by Hackers Affiliated With Iranian Government04 Dec 2023UncategorizedAdmin04Dec 2023New Relic Says Hackers Accessed Internal Environment Using Stolen Credentials04 Dec 2023UncategorizedAdmin04Dec 2023Fortifying the bridge between tech and business in the C-suite04 Dec 2023UncategorizedAdmin04Dec […]

04Dec 2023

New Relic Says Hackers Accessed Internal Environment Using Stolen Credentials

04Dec 2023

Fortifying the bridge between tech and business in the C-suite

04Dec 2023

The CIO’s new role: Orchestrator-in-chief

04Dec 2023

Beyond gigabit: the need for 10 Gbps in business networks

03Dec 2023

Breaches by Iran-Affiliated Hackers Spanned Multiple U.S. States, Federal Agencies Say

01Dec 2023

Website spoofing: risks, threats, and mitigation strategies for CIOs

01Dec 2023

Congressmen Ask DOJ to Investigate Water Utility Hack, Warning It Could Happen Anywhere

01Dec 2023

Gain full visibility across the Internet Stack with IPM (Internet Performance Monitoring)

01Dec 2023

Staples Confirms ‘Cybersecurity Risk’ Disrupting Online Stores

01Dec 2023

How customers can save money during periods of economic uncertainty

01Dec 2023

In Other News: Utilities Targeted by Hackers, Aerospace Attacks, Killnet Leader Unmasked

01Dec 2023

New ‘Turtle’ macOS Ransomware Analyzed

01Dec 2023

US Sanctions North Korean Cyberespionage Group Kimsuky

01Dec 2023

10 business intelligence certifications and certificates to advance your BI career

01Dec 2023

LexisNexis rises to the generative AI challenge

01Dec 2023

Simple Attack Allowed Extraction of ChatGPT Training Data

30Nov 2023

Generative AI’s ‘show me the money’ moment

30Nov 2023

Apple Patches WebKit Flaws Exploited on Older iPhones

30Nov 2023

How customers capture real economic value with zero trust

30Nov 2023

Major Security Flaws in Zyxel Firewalls, Access Points, NAS Devices

30Nov 2023

Thinking of hibernating through the metaverse winter?

30Nov 2023

A cloud-based solution to rescue millions from energy poverty

30Nov 2023

Meta Takes Action Against Multiple Foreign Influence Campaigns

30Nov 2023

US Sanctions Cryptocurrency Mixer Sinbad for Aiding North Korean Hackers

30Nov 2023

Black Basta Ransomware Group Received Over $100 Million From 90 Victims

30Nov 2023

Qlik Sense Vulnerabilities Exploited in Ransomware Attacks

30Nov 2023

Dollar Tree Impacted by ZeroedIn Data Breach Affecting 2 Million Individuals

30Nov 2023

Palo Alto Networks Unveils New Rugged Firewall for Industrial Environments 

30Nov 2023

CISA Debuts ‘Secure by Design’ Alert Series

30Nov 2023

Google’s RETVec Open Source Text Vectorizer Bolsters Malicious Email Detection

30Nov 2023

400G: Building bandwidth for the next lap

30Nov 2023

CIO Darlene Taylor’s formula for success: Listen, drive, care

30Nov 2023

8 change management questions every IT leader must answer

30Nov 2023

Hundreds of Malicious Android Apps Target Iranian Mobile Banking Users

29Nov 2023

Keyless Goes Independent, Raises $6M for Biometric Authentication

29Nov 2023

Okta Broadens Scope of Data Breach: All Customer Support Users Affected

29Nov 2023

New BLUFFS Bluetooth Attack Methods Can Have Large-Scale Impact: Researcher

29Nov 2023

Google Patches Seventh Chrome Zero-Day of 2023

29Nov 2023

CISA Warns of Unitronics PLC Exploitation Following Water Utility Hack

29Nov 2023

Five Cybersecurity Predictions for 2024

29Nov 2023

Google Will Start Deleting ‘Inactive’ Accounts in December. Here’s What You Need to Know

29Nov 2023

Per Scholas redefines IT hiring by diversifying the IT talent pipeline

29Nov 2023

Steps Gerresheimer takes to transform its IT

29Nov 2023

4 remedies to avoid cloud app migration headaches

28Nov 2023

The Importance of Identity Management in Security

28Nov 2023

The hybrid approach: Get the best of both mainframe and cloud

28Nov 2023

Why data virtualization is critical for business success

28Nov 2023

How to evolve IT systems into innovation engines

28Nov 2023

Dear Oracle Cloud…I need my own space

28Nov 2023

Exploitation of Critical ownCloud Vulnerability Begins

28Nov 2023

Police Dismantle Major Ukrainian Ransomware Operation

28Nov 2023

Amazon One Enterprise Enables Palm-Based Access to Physical Locations, Digital Assets

28Nov 2023

Los Angeles SIM Swapper Sentenced to 8 Years in Prison

28Nov 2023

Critical Vulnerability Found in Ray AI Framework 

28Nov 2023

Making sense of zero trust – why a managed SASE solution is the ideal option for enterprises

28Nov 2023

What you don’t know about data management could kill your business

28Nov 2023

8 tips for unleashing the power of unstructured data

28Nov 2023

Ardent Hospitals Diverting Patients Following Ransomware Attack

27Nov 2023

Old age isn’t what is used to be: a versatile solution for a more independent breed of seniors

27Nov 2023

Critical ownCloud Flaws Lead to Sensitive Information Disclosure, Authentication Bypass

27Nov 2023

Henry Schein Again Restoring Systems After Ransomware Group Causes More Disruption

27Nov 2023

US, UK Cybersecurity Agencies Publish AI Development Guidance

27Nov 2023

UK, Korea Warn of DPRK Supply Chain Attacks Involving Zero-Day Flaws

27Nov 2023

Fidelity National Financial Takes Down Systems Following Cyberattack

27Nov 2023

Hacktivism: What’s in a Name… It May be More Than You Expect

27Nov 2023

Hackers Hijack Industrial Control System at US Water Utility 

27Nov 2023

Turning the tide in STEM career roadblocks at Synchrony

27Nov 2023

10 things keeping IT leaders up at night

27Nov 2023

Pentagon’s AI Initiatives Accelerate Hard Decisions on Lethal Autonomous Weapons

25Nov 2023

Broadcom Planning to Complete Deal for $69 Billion Acquisition of VMWare After Regulators Give OK

24Nov 2023

North Korean Software Supply Chain Attack Hits North America, Asia 

24Nov 2023

In Other News: National Laboratory Breach, Airplane GPS Attacks, Russia Accuses Allies of Hacking

24Nov 2023

Germany’s ITZBund is moving federal IT into the cloud

24Nov 2023

The 15 most valuable IT certifications today

23Nov 2023

A forensic look to modernize tech at South Africa’s SIU

23Nov 2023

What CIOs can learn from the massive Optus outage

22Nov 2023

Thrive with Digital, Accelerating Intelligence for Electric Power

22Nov 2023

How machines learned to chat

22Nov 2023

Researchers Discover Dangerous Exposure of Sensitive Kubernetes Secrets

22Nov 2023

185,000 Individuals Impacted by MOVEit Hack at Car Parts Giant AutoZone 

22Nov 2023

Microsoft Offers Up to $20,000 for Vulnerabilities in Defender Products

22Nov 2023

Sam Altman is Back as OpenAI CEO Just Days After Being Removed, Along With a New Board

22Nov 2023

Windows Hello Fingerprint Authentication Bypassed on Popular Laptops

22Nov 2023

Kansas Officials Blame 5-Week Disruption of Court System on ‘Sophisticated Foreign Cyberattack’

22Nov 2023

Humans Are Notoriously Bad at Assessing Risk

22Nov 2023

Citrix, Gov Agencies Issue Fresh Warnings on CitrixBleed Vulnerability

22Nov 2023

5 pillars of a cloud-conscious culture

22Nov 2023

Keeping the customer journey and experience as a North Star

21Nov 2023

LLM Security Startup Lasso Emerges From Stealth Mode

21Nov 2023

CISA Offering Free Cybersecurity Services to Non-Federal Critical Infrastructure Entities

21Nov 2023

Tor Network Removes Risky Relays Associated With Cryptocurrency Scheme

21Nov 2023

Canadian Military, Police Impacted by Data Breach at Moving Companies

21Nov 2023

Insider Q&A: Pentagon AI Chief on Network-Centric Warfare, Generative AI Challenges

21Nov 2023

Sumo Logic Completes Investigation Into Recent Security Breach

21Nov 2023

Microsoft Paid Out $63 Million Since Launch of First Bug Bounty Program 10 Years Ago

21Nov 2023

Air Force CDAIO Eileen Vidrine on leading top-flight AI operations

21Nov 2023

7 steps for turning shadow IT into a competitive edge

21Nov 2023

Generative AI’s most noble mission: Improving and saving lives

20Nov 2023

Gen AI: Should you build or buy?

20Nov 2023

5 ways AI is showing promise as a decision-maker

20Nov 2023

Frucor Suntory amplifies sales and service with a unified mobile app

20Nov 2023

The $400 billion opportunity for AI in customer service

20Nov 2023

Morgan Stanley Fined $6.5 Million for Exposing Customer Information

20Nov 2023

CISA Releases Cybersecurity Guidance for Healthcare, Public Health Organizations

20Nov 2023

Johnson Controls Patches Critical Vulnerability in Industrial Refrigeration Products

20Nov 2023

Microsoft Hires Sam Altman and OpenAI’s New CEO Vows to Investigate His Firing

20Nov 2023

Russia’s LitterDrifter USB Worm Spreads Beyond Ukraine

20Nov 2023

Yamaha Motor Confirms Data Breach Following Ransomware Attack

20Nov 2023

5 Steps to Assessing Risk Profiles of Third-Party SSE Platforms

20Nov 2023

US Announces $70 Million Cybersecurity Boost for Rural, Municipal Utilities

20Nov 2023

250 Organizations Take Part in Electrical Grid Security Exercise

20Nov 2023

Can developer productivity be measured? Better than you think

20Nov 2023

6 most underhyped technologies in IT — plus one that’s not dead yet

20Nov 2023

K-12 Schools Improve Protection Against Online Attacks, but Many Are Vulnerable to Ransomware Gangs

18Nov 2023

ChatGPT-Maker OpenAI Fires CEO Sam Altman, the Face of the AI Boom, for Lack of Candor With Company

17Nov 2023

2 Environmentalists Who Were Targeted by a Hacking Network Say the Public Is the Real Victim

17Nov 2023

FCC Tightens Telco Rules to Combat SIM-Swapping

17Nov 2023

In Other News: Major Law Firm Hacked, Chinese Bank Pays Ransom, PyPI Security Audit

17Nov 2023

US Teen Pleads Guilty to Credential Stuffing Attack on Fantasy Sports Website

17Nov 2023

Over a Dozen Exploitable Vulnerabilities Found in AI/ML Tools

17Nov 2023

Researchers Dive Into Activities of Indian Hack-for-Hire Firm Appin

17Nov 2023

CISA Warns of Attacks Exploiting Sophos Web Appliance Vulnerability

17Nov 2023

Key GOP Lawmaker Calls for Renewal of Surveillance Tool as He Proposes Changes to Protect Privacy

17Nov 2023

Israeli Man Who Made $5M From Hacking Scheme Sentenced to Prison in US

17Nov 2023

CitrixBleed Vulnerability Exploitation Suspected in Toyota Ransomware Attack

17Nov 2023

What is a managed service provider? Strategic outsourcing for IT services

17Nov 2023

IHG maximizes hospitality with multicloud

16Nov 2023

Biden Campaign Looking for CISO

16Nov 2023

Google Adds Passkey Support to New Titan Security Key 

16Nov 2023

State-Sponsored Online Spies Likely to Target Australian Submarine Program, Spy Agency Says

16Nov 2023

Zimbra Zero-Day Exploited to Hack Government Emails

16Nov 2023

Survey: Are you digitally ready for AI-enhanced ERP?

16Nov 2023

Bad Bots Account for 73% of Internet Traffic: Analysis

16Nov 2023

ServiceNow adds gen AI to more workflows, including chatbot creation

16Nov 2023

Administrator of Darkode Hacking Forum Sentenced to Prison

16Nov 2023

Threat Intel: To Share or Not to Share is Not the Question

16Nov 2023

Ransomware Group Files SEC Complaint Over Victim’s Failure to Disclose Data Breach

16Nov 2023

The Hartford CIO Deepa Soni on transforming at scale

16Nov 2023

5 ways to deploy your own large language model

16Nov 2023

Illuminating the black box: why CIOs should consider publishing an annual IT report

16Nov 2023

Microsoft Ignite 2023: 11 takeaways for CIOs

15Nov 2023

Malicious innovation, building resilience, and the importance of chocolate

15Nov 2023

A new and stronger entity: Versuni transforms its company – and technology

15Nov 2023

Microsoft Patches Sensitive Information Disclosure Vulnerability in Azure CLI

15Nov 2023

Application Security Startup Aikido Security Raises €5 Million

15Nov 2023

Data Security Firm ALTR Banks $25M Series C 

15Nov 2023

US Announces IPStorm Botnet Takedown and Its Creator’s Guilty Plea

15Nov 2023

CISA Outlines AI-Related Cybersecurity Efforts

15Nov 2023

SAP Patches Critical Vulnerability in Business One Product

15Nov 2023

State-Backed Hackers a Threat to Australia, Agency Warns

15Nov 2023

RADICL Adds $9 Million in Funding to Fortify Cyber Defenses of SMBs in Defense Industrial Base

15Nov 2023

Addressing the State of AI’s Impact on Cyber Disinformation/Misinformation

15Nov 2023

How ServiceNow gets the most out of generative AI

15Nov 2023

We’re all becoming software CIOs — a role Red Hat CIO Jim Palermo knows well

15Nov 2023

CIO as enabler: Building an ecosystem of innovation partners

15Nov 2023

New Intel CPU Vulnerability ‘Reptar’ Can Allow DoS Attacks, Privilege Escalation

15Nov 2023

Chipmaker Patch Tuesday: Intel, AMD Address Over 130 Vulnerabilities

14Nov 2023

More connected, less secure: Addressing IoT and OT threats to the enterprise

14Nov 2023

Critical Authentication Bypass Flaw in VMware Cloud Director Appliance

14Nov 2023

The future of IT: what we can learn from the mainframe

14Nov 2023

How state and local governments can close the digital divide in education with fast, affordable connectivity

14Nov 2023

How leadership can empower developers in the AI era

14Nov 2023

Microsoft Warns of Critical Bugs Being Exploited in the Wild

14Nov 2023

The network is your office intelligence center

14Nov 2023

How 5G is driving big innovations in healthcare for veterans

14Nov 2023

How transportation agencies can maximize infrastructure investments with network modernization

14Nov 2023

UK Cybersecurity Center Says ‘Deepfakes’ and Other AI Tools Pose a Threat to the Next Election

14Nov 2023

Zip Raises $7.7 Million to Expand SMB Cybersecurity Business

14Nov 2023

Protected Virtual Machines Exposed to New ‘CacheWarp’ AMD CPU Attack

14Nov 2023

Adobe Patch Tuesday: Critical Bugs in Acrobat, Reader, ColdFusion

14Nov 2023

9 cloud strategy questions every IT leader must answer

14Nov 2023

What is code-to-cloud security intelligence?

14Nov 2023

Royal Ransomware Possibly Rebranding After Targeting 350 Organizations Worldwide

14Nov 2023

MySQL Servers, Docker Hosts Infected With DDoS Malware

14Nov 2023

ICS Patch Tuesday: 90 Vulnerabilities Addressed by Siemens and Schneider Electric

14Nov 2023

Radiant Snags $15 Million for AI-Powered SOC Technology

14Nov 2023

Top 10 API Security Threats for Q3 2023

14Nov 2023

Webinar Today: Using Governance and Privilege to Gain Control Over Third-Party Access

14Nov 2023

Google Suing Cybercriminals Who Delivered Malware via Fake Bard Downloads

14Nov 2023

Hacker Conversations: Chris Wysopal, AKA Weld Pond

14Nov 2023

PyPI Packages Found to Expose Thousands of Secrets

14Nov 2023

22 Energy Firms Hacked in Largest Coordinated Attack on Denmark’s Critical Infrastructure

14Nov 2023

Relationship management: The unsung art of optimizing IT teams

14Nov 2023

Where do IT leaders stand on securing the mainframe?

14Nov 2023

Getting the most out of open source without sacrificing security

14Nov 2023

4 steps to connect change management and DevOps

14Nov 2023

Bringing together DevOps and mainframe security

13Nov 2023

12 strategic tips CIOs can learn from tech vendor CTOs

13Nov 2023

The retail edge: Where data powers game-changing customer experiences

13Nov 2023

Ransomware Group RansomedVC Closes Shop

13Nov 2023

Dragos Says No Evidence of Breach After Ransomware Gang Claims Hack via Third Party

13Nov 2023

2.2 Million Impacted by Data Breach at McLaren Health Care

13Nov 2023

Ransomware Group Leaks Files Allegedly Stolen From Boeing

13Nov 2023

Operations at Major Australian Ports Significantly Disrupted by Cyberattack

13Nov 2023

Mr. Cooper Says Customer Data Compromised in Cyberattack

13Nov 2023

10 digital transformation roadblocks — and 5 tips for overcoming them

13Nov 2023

Yellen Says Ransomware Attack on China’s Biggest Bank Minimally Disrupted Treasury Market Trades

13Nov 2023

Huawei’s Vision for Intelligent Networking Unveiled at GITEX Global 2023

10Nov 2023

In Other News: EU Government Surveillance, Rewards for Iranian Hackers, Evolution of Chinese Spying

10Nov 2023

Cavelo Raises CA$5 Million for Attack Surface Management Platform

10Nov 2023

France, UK Seek Greater Regulation of Commercial Spyware   

10Nov 2023

Intel Sued Over ‘Downfall’ CPU Vulnerability 

10Nov 2023

1.3 Million Maine Residents Impacted by MOVEit Hack

10Nov 2023

US Government Issues Guidance on SBOM Consumption

10Nov 2023

Ransomware Attack on China’s Biggest Bank Disrupts Treasury Market Trades, Reports Say

10Nov 2023

4 ways ICA rebuilds and cleans up IT

10Nov 2023

How Synchrony helps veterans become IT leaders

10Nov 2023

How the new AI executive order stacks up: B-

09Nov 2023

Tidal Cyber Raises $5 Million for Threat-Informed Defense Platform

09Nov 2023

Medical Company Fined $450,000 by New York AG Over Data Breach

09Nov 2023

Securing your AI-powered network transformation: A guide for C-suite leaders

09Nov 2023

Generative AI: now is the time to ‘learn by doing’

09Nov 2023

Major ChatGPT Outage Caused by DDoS Attack

09Nov 2023

‘BlazeStealer’ Malware Delivered to Python Developers Looking for Obfuscation Tools

09Nov 2023

Japan Aviation Electronics Targeted in Ransomware Attack

09Nov 2023

Risk Ledger Raises £6.25 Million for Supply Chain Security Solution

09Nov 2023

In transition: How Kyndryl’s CIO weaned the company off IBM’s systems

09Nov 2023

Chief AI officer: What it takes to land the C-suite’s hottest new job

09Nov 2023

SysAid Zero-Day Vulnerability Exploited by Ransomware Group

09Nov 2023

CISA Says SLP Vulnerability Allowing Amplified DoS Attacks Exploited in the Wild

09Nov 2023

Russian Hackers Used Novel OT Attack to Disrupt Ukrainian Power Amid Mass Missile Strikes

08Nov 2023

Why you must extend Zero Trust to public cloud workloads

08Nov 2023

Protecto Joins Cadre of Startups in AI Data Protection Space

08Nov 2023

GitHub Enhances Security Capabilities With AI

08Nov 2023

DHS Launches New Critical Infrastructure Security and Resilience Campaign

08Nov 2023

Offense Intended: How Adversarial Emulation Went From State Secret To Board Bullet Point

08Nov 2023

Long and winding railroad – heading for the cloud

08Nov 2023

Sumo Logic Urges Users to Change Credentials Due to Security Breach

08Nov 2023

FBI Highlights Emerging Initial Access Methods Used by Ransomware Groups 

08Nov 2023

Marina Bay Sands Discloses Data Breach Impacting 665k Customers

08Nov 2023

How a tech model at Univeris fosters team building with empathy

08Nov 2023

New US CIO appointments, November 2023

08Nov 2023

Principal Financial unifies IT to lay foundation for growth

08Nov 2023

Many CIOs are better equipped to combat rising IT costs. Are you?

08Nov 2023

Dropper Service Bypassing Android Security Restrictions to Install Malware

07Nov 2023

Guarding the gates: a look at critical infrastructure security in 2023

07Nov 2023

10 essential tips for bolstering cloud security in your business

07Nov 2023

Generative AI hallucinations: What can IT do?

07Nov 2023

Data Brokers Expose Sensitive US Military Member Info to Foreign Threat Actors: Study

07Nov 2023

Critical Vulnerabilities Expose Veeam ONE Software to Code Execution

07Nov 2023

Salesforce Automotive Cloud adds Einstein Studio, Fleet Management

07Nov 2023

Free Tool Helps Industrial Organizations Find OPC UA Vulnerabilities

07Nov 2023

New MacOS Malware Linked to North Korean Hackers

07Nov 2023

Myrror Security Emerges From Stealth Mode With $6 Million in Funding

07Nov 2023

37 Vulnerabilities Patched in Android With November 2023 Security Updates

07Nov 2023

Federal Push for Secure-by-Design: What It Means for Developers

07Nov 2023

Narrowing the Focus of AI in Security

07Nov 2023

Ransomware Gang Leaks Data Allegedly Stolen From Canadian Hospitals

07Nov 2023

What is Kyndryl? IBM’s managed infrastructure services spin-off explained

07Nov 2023

The CIO’s fatal flaw: Too much leadership, not enough management

07Nov 2023

Breaking down data silos for digital success

07Nov 2023

Cybersecurity M&A Roundup: 31 Deals Announced in October 2023

06Nov 2023

Travelers to Acquire Cyberinsurance Firm Corvus for $435 Million

06Nov 2023

Palo Alto to Acquire Talon, Intensifying Competition in Cloud Data Security 

06Nov 2023

American Airlines Pilot Union Recovering After Ransomware Attack

06Nov 2023

US Sanctions Russian National for Helping Ransomware Groups Launder Money

06Nov 2023

‘Looney Tunables’ Glibc Vulnerability Exploited in Cloud Attacks 

06Nov 2023

Iranian APT Targets Israeli Education, Tech Sectors With New Wipers

06Nov 2023

Exploitation of Critical Confluence Vulnerability Begins

06Nov 2023

The RACI matrix: Your blueprint for project success

06Nov 2023

Employee engagement: 10 best practices for improving your culture

06Nov 2023

IT leader’s survival guide: 8 tips to thrive in the years ahead

06Nov 2023

A Cyber Breach Delays Poll Worker Training in Mississippi’s Largest County Before the Statewide Vote

06Nov 2023

Microsoft Says Exchange ‘Zero Days’ Disclosed by ZDI Already Patched or Not Urgent

05Nov 2023

Low-code: An Accelerator for Digital Transformation

03Nov 2023

How AI can drive efficiencies in your supply chain

03Nov 2023

Mortgage Giant Mr. Cooper Shuts Down Systems Following Cyberattack

03Nov 2023

Okta Hack Blamed on Employee Using Personal Google Account on Company Laptop

03Nov 2023

In Other News: Airport Taxi Hacking, Post-Quantum Crypto Guidance, Stanford Breach

03Nov 2023

North Korean Hackers Use New ‘KandyKorn’ macOS Malware in Attacks

03Nov 2023

Apache ActiveMQ Vulnerability Exploited as Zero-Day

03Nov 2023

Cyberattack Disrupts Ace Hardware’s Operations

03Nov 2023

Industry Reactions to SEC Charging SolarWinds and Its CISO: Feedback Friday

03Nov 2023

Atlassian Issues Second Warning on Potential Exploitation of Critical Confluence Flaw 

03Nov 2023

What Duxbury Networking’s CIO does to balance head with heart

03Nov 2023

Burnout: An IT epidemic in the making

02Nov 2023

CIOs sharpen cloud cost strategies — just as gen AI spikes loom

02Nov 2023

When least privilege is the most important thing

02Nov 2023

After Major Cloud Hacks, Microsoft Unveils ‘Secure Future Initiative’

02Nov 2023

Your biggest barriers to digital transformation aren’t technical…they’re cultural

02Nov 2023

Xage Targets New Markets with $20 Million Investment

02Nov 2023

Former SpaceX Engineers Get $8 Million in Funding for AI Security Firm Wraithwatch

02Nov 2023

FusionAuth Snags $65 Million Investment for Customer Identity Tech

02Nov 2023

SASE success: Avoid confusion and embrace a single-vendor solution

02Nov 2023

Critical Apache ActiveMQ Vulnerability Exploited to Deliver Ransomware

02Nov 2023

Is your data strategy ready for gen AI? LOB leaders may disagree

02Nov 2023

European Privacy Officials Widen Ban on Meta’s Behavioral Advertising to Most of Europe

02Nov 2023

Microsoft Temporarily Disables SketchUp Support After Discovery of 117 Vulnerabilities

02Nov 2023

AP News Site Hit by Apparent Denial-of-Service Attack

02Nov 2023

Boeing Confirms Distribution Business Hit by Cyberattack

02Nov 2023

Rajeev Ronanki on making the leap to CEO

02Nov 2023

What is data analytics? Transforming data into better decisions

02Nov 2023

Cisco Patches 27 Vulnerabilities in Network Security Products

02Nov 2023

SAP unveils tools to help enterprises build their own gen AI apps

01Nov 2023

A simplified view of the enterprise tech market

01Nov 2023

FIRST Releases CVSS 4.0 Vuln Scoring Standard

01Nov 2023

Countries at a UK Summit Pledge to Tackle AI’s Potentially ‘Catastrophic’ Risks

01Nov 2023

8 ways IT can help supercharge your sales team

01Nov 2023

Mozi Botnet Likely Killed by Its Creators

01Nov 2023

Supply Chain Startup Chainguard Scores $61 Million Series B

01Nov 2023

Dozens of Kernel Drivers Allow Attackers to Alter Firmware, Escalate Privileges

01Nov 2023

Mass Exploitation of ‘Citrix Bleed’ Vulnerability Underway

01Nov 2023

Iranian Cyber Spies Use ‘LionTail’ Malware in Latest Attacks

01Nov 2023

MITRE Releases ATT&CK v14 With Improvements to Detections, ICS, Mobile 

01Nov 2023

Chrome 119 Patches 15 Vulnerabilities

01Nov 2023

Malicious NuGet Packages Abuse MSBuild Integrations for Code Execution

01Nov 2023

DPI: Still Effective for the Modern SOC?

01Nov 2023

SIEM and Log Management Provider Graylog Raises $39 Million

01Nov 2023

Cutting-Edge AI Raises Fears About Risks to Humanity. Are Tech and Political Leaders Doing Enough?

01Nov 2023

CIOs still grapple with what gen AI can do for the enterprise

01Nov 2023

Digital pragmatism at Volvo means more control and less agile

01Nov 2023

Former British Cyberespionage Agency Employee Gets Life in Prison for Stabbing an American Spy

31Oct 2023

Navigating Cloud Cost Complexity and Security

31Oct 2023

Beyond DevSecOps: Why fintech companies need to consider DevSecRegOps

31Oct 2023

Cybersecurity Leaders Spooked by SEC Lawsuit Against SolarWinds CISO

31Oct 2023

Atlassian CISO Urges Quick Action to Protect Confluence Instances From Critical Vulnerability

31Oct 2023

Palo Alto Networks to Acquire Cloud Security Start-Up Dig Security

31Oct 2023

IAM Credentials in Public GitHub Repositories Harvested in Minutes

31Oct 2023

Scaling security: How to build security into the entire development pipeline

31Oct 2023

Attackers Exploiting Critical F5 BIG-IP Vulnerability

31Oct 2023

Welcome to the trusted edge

31Oct 2023

Extending ZTNA to Protect Against Insider Threats

31Oct 2023

Ethics in IT: The CIO’s new business imperative

31Oct 2023

SEC Charges SolarWinds and Its CISO With Fraud and Cybersecurity Failures

30Oct 2023

Canada Bans WeChat and Kaspersky on Government Phones

30Oct 2023

Want AI? Here’s how to get your data and infrastructure AI-ready

30Oct 2023

How Value Stream Management is fueling success at Boeing, Tyson, and Verizon

30Oct 2023

Boeing Investigating Ransomware Attack Claims

30Oct 2023

Proofpoint to Acquire Tessian for AI-Powered Email Security Tech

30Oct 2023

Florida SIM Swapper Sentenced to Prison for Cryptocurrency Theft

30Oct 2023

Attackers Can Use Modified Wikipedia Pages to Mount Redirection Attacks on Slack

30Oct 2023

Apple Improves iMessage Security With Contact Key Verification

30Oct 2023

Hackers Earn Over $1 Million at Pwn2Own Toronto 2023

30Oct 2023

AI Safety Summit: What to expect as global leaders eye AI regulation

30Oct 2023

Biden Wants to Move Fast on AI Safeguards and Will Sign an Executive Order to Address His Concerns

30Oct 2023

Whistleblowers: Should CISOs Consider Them a Friend or Foe?

30Oct 2023

Why adaptability is the new digital transformation

30Oct 2023

The rise of the chief transformation officer

27Oct 2023

Advanced ‘StripedFly’ Malware With 1 Million Infections Shows Similarities to NSA-Linked Tools

27Oct 2023

In Other News: Ex-NSA Employee Spying for Russia, EU Threat Landscape, Cyber Education Funding

27Oct 2023

F5 Warns of Critical Remote Code Execution Vulnerability in BIG-IP

27Oct 2023

UN Chief Appoints 39-Member Panel to Advise on International Governance of Artificial Intelligence

27Oct 2023

16 best entry-level IT certifications to launch your career

27Oct 2023

Lufthansa’s digital future takes flight with ‘Digital Hangar’

27Oct 2023

AWS revenue growth stabilizes with a boost from generative AI-led services

26Oct 2023

With generative AI, IT must deliver knowledge…not just technology

26Oct 2023

What IT executives are saying about vendor consolidation

26Oct 2023

Why IT needs to be in the driver’s seat with generative AI

26Oct 2023

Run Generative AI on-premises, with a cloud experience

26Oct 2023

Critical Mirth Connect Vulnerability Could Expose Sensitive Healthcare Data

26Oct 2023

AI Security Firm Cranium Raises $25 Million

26Oct 2023

Hackers Earn $350k on Second Day at Pwn2Own Toronto 2023

26Oct 2023

iLeakage Attack Exploits Safari to Steal Sensitive Data From Macs, iPhones

26Oct 2023

CISA, HHS Release Cybersecurity Healthcare Toolkit

26Oct 2023

Kansas Court System Down Nearly 2 Weeks in ‘Security Incident’ That Has Hallmarks of Ransomware

26Oct 2023

Key Learnings from “Big Game” Ransomware Campaigns

26Oct 2023

Weapons Systems Provide Valuable Lessons for ICS/OT Security

26Oct 2023

Japanese Watchmaking Giant Seiko Confirms Personal Data Stolen in Ransomware Attack

26Oct 2023

Google Announces Bug Bounty Program and Other Initiatives to Secure AI

26Oct 2023

Day 3 of SecurityWeek’s 2023 ICS Cybersecurity Conference — Challenges and Solutions

26Oct 2023

Amazon Rolls Out Independent Cloud for Europe to Address Stricter Privacy Standards

26Oct 2023

IBM bets on generative AI to escape economic headwinds

26Oct 2023

COO Marina Bellini on leading IT talent for growth

26Oct 2023

What is a business intelligence analyst? A key role for data-driven decisions

26Oct 2023

5 key leadership skills an executive coach can help you master

26Oct 2023

Multicloud by design simplifies your cloud experience

25Oct 2023

‘YoroTrooper’ Espionage Group Linked to Kazakhstan

25Oct 2023

Apple Ships Major iOS, macOS Security Updates

25Oct 2023

Generative AI: 5 enterprise predictions for AI and security — for 2023, 2024, and beyond

25Oct 2023

What you need to know about Okta’s security breach

25Oct 2023

How medical technology helps us live the best version of ourselves

25Oct 2023

Firefox, Chrome Updates Patch High-Severity Vulnerabilities

25Oct 2023

Russian Hackers Caught Exploiting Roundcube Webmail Zero-Day

25Oct 2023

Hackers Earn $400k on First Day at Pwn2Own Toronto 2023

25Oct 2023

Mandiant Intelligence Chief Raises Alarm Over China’s ‘Volt Typhoon’ Hackers in US Critical Infrastructure

25Oct 2023

Part 1: Guarding against sophisticated threats: Strategies for your best defense

25Oct 2023

Part 2: Guarding against sophisticated threats: Strategies for your best defense

25Oct 2023

New Project Analyzes and Catalogs Vendor Support for Secure PLC Coding

25Oct 2023

What is AI’s current impact on cybersecurity?

25Oct 2023

Censys Banks $75M for Attack Surface Management Technology

25Oct 2023

Critical Infrastructure Stakeholders Gather for Day 2 of SecurityWeek’s 2023 ICS Cybersecurity Conference

25Oct 2023

VMware vCenter Flaw So Critical, Patches Released for End-of-Life Products

25Oct 2023

The Cybersecurity Resilience Quotient: Measuring Security Effectiveness

25Oct 2023

How Whirlpool’s CIO makes digital business models run end to end

25Oct 2023

3 commandments that should drive every API strategy

25Oct 2023

Author E. Freya Williams has a Message for Tech Leaders

24Oct 2023

Personal Information Stolen in City of Philadelphia Email Hack

24Oct 2023

Top overlooked GenAI security risks for businesses

24Oct 2023

Fortifying your engineering ecosystem: The three pillars of application security

24Oct 2023

Unveiling the risks of OT systems and how to secure them

24Oct 2023

Exploring the pros and cons of cloud-based large language models

24Oct 2023

Utilizing AI to defend the Black Hat NOC

24Oct 2023

What do Security Operations Centers really need—today…and tomorrow

24Oct 2023

Empowering cyber resilience in education: Three strategies for the future

24Oct 2023

Four things that matter in the AI hype cycle

24Oct 2023

Rockwell Automation Warns Customers of Cisco Zero-Day Affecting Stratix Switches

24Oct 2023

Stealth Techniques Used in ‘Operation Triangulation’ iOS Attack Dissected

24Oct 2023

The $64k Question: How Does AI Phishing Stack Up Against Human Social Engineers?

24Oct 2023

Generative AI and the Transformation of Everything

24Oct 2023

University of Michigan Says Personal Information Stolen in August Data Breach

24Oct 2023

Adlumin Snags $70M to Boost Security for Mid-Market Firms

24Oct 2023

Number of Cisco Devices Hacked via Zero-Day Remains High as Attackers Update Implant

24Oct 2023

Canada: Lawmakers Targeted by China-Linked ‘Spamouflage’ Disinformation

24Oct 2023

SecurityWeek’s 2023 ICS Cybersecurity Conference Kicks Off in Atlanta

24Oct 2023

7 ways diversity and inclusion help teams perform better

24Oct 2023

7 sins of digital transformation

23Oct 2023

Before generative AI there was… just AI

23Oct 2023

China Crackdown on Cyber Scams in Southeast Asia Nets Thousands but Leaves Networks Intact

23Oct 2023

DEAC and DLC: Delivering sustainable cloud services to the Baltics and beyond

23Oct 2023

Casio Says Personal Information Accessed in Web Application Server Hack

23Oct 2023

Blockaid Emerges From Stealth With $33 Million Investment

23Oct 2023

SolarWinds Patches High-Severity Flaws in Access Rights Manager

23Oct 2023

Rockwell Automation to Acquire ICS/OT Security Firm Verve Industrial

23Oct 2023

Enterprise Browser Startup Island Banks $100M in Funding

23Oct 2023

DC Board of Elections Says Full Voter Roll Compromised in Data Breach

23Oct 2023

Accelerating sustainability to build stronger businesses

23Oct 2023

Becoming the sustainability partner our customers need

23Oct 2023

Elevate your digital transformation with impactful sustainability

23Oct 2023

Accelerating digital transformation with sustainable solutions

23Oct 2023

Future First: Sustainability at Equinix

23Oct 2023

ESG in Action: The Dell Technologies FY23 ESG Report

23Oct 2023

Data-driven sustainability: Dell’s commitment to industry standards

23Oct 2023

Embracing sustainable IT unlocks environmental, business, and financial benefits

23Oct 2023

How we’re driving sustainable impact for business and society

23Oct 2023

Unlock sustainability and efficiency with Dell APEX

23Oct 2023

Cisco Finds Second Zero-Day as Number of Hacked Devices Apparently Drops

23Oct 2023

5 steps for making tech ethics work for your company

23Oct 2023

Transforming IT for digital success

23Oct 2023

The strategy behind becoming a manufacturing superpower

20Oct 2023

Allstate’s cloud-first approach to digital transformation pays off

20Oct 2023

Mainframe data: hybrid cloud object store vs. tape

20Oct 2023

How to manage data integration during an acquisition

20Oct 2023

Okta Support System Hacked, Sensitive Customer Data Stolen

20Oct 2023

Bud Financial helps banks and their customers make more informed decisions using AI with DataStax and Google Cloud

20Oct 2023

In Other News: Energy Services Firm Hacked, Tech CEO Gets Prison Time, X Glitch Leads to CIA Channel Hijack

20Oct 2023

Philippine Military Ordered to Stop Using Artificial Intelligence Apps Due to Security Risks

20Oct 2023

Three burning questions before FutureIT New York

20Oct 2023

Fraud Detection Firm Spec Raises $15 Million

20Oct 2023

Authorities Seize Control of RagnarLocker Ransomware Dark Web Site

20Oct 2023

Managing and fulfilling complex, high-volume B2B orders

20Oct 2023

Iranian Hackers Lurked for 8 Months in Government Network

20Oct 2023

What is a Scrum master? A key role for project success

20Oct 2023

Top 8 IT certifications in demand today

20Oct 2023

HUAWEI eKit makes digital business easy for distributors

19Oct 2023

5 modern challenges in data integration and how CIOs can overcome them

19Oct 2023

CIOs press ahead for gen AI edge — despite misgivings

19Oct 2023

Harmonic Lands $7M Funding to Secure Generative AI Deployments

19Oct 2023

Unleashing the power of integration to scale industrial equipment sales, manufacturing, and service global channels

19Oct 2023

FBI: Thousands of Remote IT Workers Sent Wages to North Korea to Help Fund Weapons Program

19Oct 2023

CipherStash Raises $3 Million for Encryption-in-Use Technology

19Oct 2023

Google Play Protect Gets Real-Time Code Scanning

19Oct 2023

US Government Releases Anti-Phishing Guidance

19Oct 2023

Operations of Healthcare Solutions Giant Henry Schein Disrupted by Cyberattack

19Oct 2023

Number of Cisco Devices Hacked via Unpatched Vulnerability Increases to 40,000

19Oct 2023

The biggest enterprise technology M&A deals of the year

19Oct 2023

13 power tips for Microsoft Power BI

19Oct 2023

Inside Walmart’s generative AI journey

19Oct 2023

North Korean Hackers Exploiting Recent TeamCity Vulnerability

18Oct 2023

Finland Charges Psychotherapy Hacker With Extortion

18Oct 2023

Three Months After Patch, Gov-Backed Actors Exploiting WinRAR Flaw

18Oct 2023

Predictive analytics helps Fresenius Medical Care anticipate dialysis complications

18Oct 2023

Survey: Why CIOs and CTOs want a new model for IT support and services

18Oct 2023

Former Navy IT Manager Sentenced to Prison for Hacking, Selling PII

18Oct 2023

Darwinium Raises $18 Million for Edge-based Fraud Prevention Tech

18Oct 2023

D-Link Says Hacker Exaggerated Data Breach Claims

18Oct 2023

Fraud Prevention Firm Fingerprint Raises $33 Million

18Oct 2023

Cybersecurity M&A Roundup for First Half of October 2023

18Oct 2023

Oracle Patches 185 Vulnerabilities With October 2023 CPU

18Oct 2023

Lost and Stolen Devices: A Gateway to Data Breaches and Leaks

18Oct 2023

How digital turned Nationale-Nederlanden into an omnichannel company

18Oct 2023

Tens of Thousands of Cisco Devices Hacked via Zero-Day Vulnerability

18Oct 2023

Recent NetScaler Vulnerability Exploited as Zero-Day Since August

17Oct 2023

Dawn of a new day for Africa: building a modern digital economy

17Oct 2023

The 4 pillars of the Zscaler Zero Trust Exchange: Customers share their successes

17Oct 2023

Don’t make the biggest mistake in application modernization projects

17Oct 2023

CIOs must safeguard organizations with a validated Zero Trust solution

17Oct 2023

NetSuite adds generative AI to its entire ERP suite

17Oct 2023

Prove Identity Snags $40M Funding for ID Verification Tech

17Oct 2023

Beyond Quantum: MemComputing ASICs Could Shatter 2048-bit RSA Encryption

17Oct 2023

Critical Vulnerabilities Expose ​​Weintek HMIs to Attacks

17Oct 2023

Anonybit Raises $3 Million for Biometric Authentication Platform

17Oct 2023

US Gov Expects Widespread Exploitation of Atlassian Confluence Vulnerability

17Oct 2023

NSA Publishes ICS/OT Intrusion Detection Signatures and Analytics

17Oct 2023

How to get internal employee poaching right

17Oct 2023

7 cloud market trends and how they will impact IT

17Oct 2023

WordPress Websites Hacked via Royal Elementor Plugin Zero-Day

17Oct 2023

Cisco Devices Hacked via IOS XE Zero-Day Vulnerability

16Oct 2023

Don’t gamble with your identity verification practices

16Oct 2023

How to capitalize on ‘Trustworthy AI’

16Oct 2023

The case for predictive AI

16Oct 2023

FinOps is the discipline enterprises need to optimize cloud spending

16Oct 2023

Exploring crucial terminal emulation capabilities

16Oct 2023

How to get started with AI to speed software delivery

16Oct 2023

Are enterprise architects the new platform team leaders?

16Oct 2023

Is it time to install a Chief AI Officer?

16Oct 2023

PCI DSS version 4.0: Is your payment card data security program ready?

16Oct 2023

PCI compliance: The best defense is a great defense

16Oct 2023

IT services company Atos runs into headwinds with plan for IBM-style split

16Oct 2023

PCI compliance: Is your qualified security assessor up to the task?

16Oct 2023

Signal Pours Cold Water on Zero-Day Exploit Rumors

16Oct 2023

Academics Devise Cyber Intrusion Detection System for Unmanned Robots

16Oct 2023

Milesight Industrial Router Vulnerability Possibly Exploited in Attacks

16Oct 2023

Equifax Fined $13.5 Million Over 2017 Data Breach

16Oct 2023

Microsoft Improving Windows Authentication, Disabling NTLM

16Oct 2023

Cedar Fair’s digital strategy based on ‘frictionless fun’

16Oct 2023

Hybrid meetings: 5 best practices for better outcomes

16Oct 2023

Why IT projects still fail

16Oct 2023

EPA Withdraws Water Sector Cybersecurity Rules Due to Lawsuits

16Oct 2023

Spyware Caught Masquerading as Israeli Rocket Alert Applications

13Oct 2023

Business AI will change the way businesses are run

13Oct 2023

CISA Now Flagging Vulnerabilities, Misconfigurations Exploited by Ransomware

13Oct 2023

In Other News: Ex-Uber Security Chief Appeal, New Offerings From Tech Giants, Crypto Bounty

13Oct 2023

Juniper Networks Patches Over 30 Vulnerabilities in Junos OS

13Oct 2023

What is a data architect? Skills, salaries, and how to become a data framework master

13Oct 2023

11 most in-demand gen AI jobs companies are hiring for

13Oct 2023

Microsoft Offers Up to $15,000 in New AI Bug Bounty Program

13Oct 2023

Dozens of Squid Proxy Vulnerabilities Remain Unpatched 2 Years After Disclosure

13Oct 2023

Microsoft receives $29B IRS tax notices for decade-old transactions

12Oct 2023

Your Generative AI strategy could use a startup’s touch

12Oct 2023

SAP’s new generative AI pricing: Neither transparent nor explainable yet

12Oct 2023

Proving your worth: Strategies to validate and elevate your IT service department

12Oct 2023

SEC Investigating Progress Software Over MOVEit Hack

12Oct 2023

The heat is on for a sustainable future at Siemens Gamesa

12Oct 2023

Apple Releases iOS 16 Update to Patch Exploited Vulnerability 

12Oct 2023

Backdoor Malware Found on WordPress Website Disguised as Legitimate Plugin

12Oct 2023

LinkedIn Smart Links Abused in Phishing Campaign Targeting Microsoft Accounts

12Oct 2023

Unpatched Vulnerabilities Expose Yifan Industrial Routers to Attacks

12Oct 2023

SAP offers faster updates, longer maintenance for S/4HANA in private clouds

12Oct 2023

Simpson Manufacturing Takes Systems Offline Following Cyberattack

12Oct 2023

CISO Pay Increases Are Slowing – a Look Behind the Figures

12Oct 2023

Generac’s Tim Dickson on the evolving CIO role

12Oct 2023

20 traits of highly effective project managers

12Oct 2023

SYN Ventures Announces $75 Million Seed Fund for US Cybersecurity Firms

11Oct 2023

Powering the future: How Gen AI and AI illuminate utility companies

11Oct 2023

Critical SOCKS5 Vulnerability in cURL Puts Enterprise Systems at Risk

11Oct 2023

Citrix Patches Critical NetScaler ADC, Gateway Vulnerability

11Oct 2023

Payment Card Data Stolen in Air Europa Hack

11Oct 2023

US Government Releases Security Guidance for Open Source Software in OT, ICS

11Oct 2023

Chrome 118 Patches 20 Vulnerabilities

11Oct 2023

Applying AI to API Security

11Oct 2023

Organizations Respond to HTTP/2 Zero-Day Exploited for DDoS Attacks

11Oct 2023

Chief AI officers in demand as IT leaders expect gen AI productivity boost, survey finds

11Oct 2023

Building elite teams to map out the business and customer journey

11Oct 2023

The CIO at a crossroads: Evolve or become a dead-end job

11Oct 2023

ICS Patch Tuesday: Siemens Ruggedcom Devices Affected by Nozomi Component Flaws

11Oct 2023

CISA Warns of Attacks Exploiting Adobe Acrobat Vulnerability 

11Oct 2023

Implications of generative AI for enterprise security

10Oct 2023

Microsoft Blames Nation-State Threat Actor for Confluence Zero-Day Attacks

10Oct 2023

Salesforce IT injects generative AI to ease its massive datacenter migration

10Oct 2023

Microsoft Fixes Exploited Zero-Days in WordPad, Skype for Business

10Oct 2023

Beyond the Front Lines: How the Israel-Hamas War Impacts the Cybersecurity Industry

10Oct 2023

Patch Tuesday: Code Execution Flaws in Adobe Commerce, Photoshop

10Oct 2023

Unlocking productivity: 3 key priorities for tech leaders in the age of AI

10Oct 2023

Mirai Variant IZ1H9 Adds 13 Exploits to Arsenal

10Oct 2023

‘HTTP/2 Rapid Reset’ Zero-Day Exploited to Launch Largest DDoS Attacks in History

10Oct 2023

SecurityWeek to Host 2023 ICS Cybersecurity Conference October 23-26 in Atlanta

10Oct 2023

SAP Releases 7 New Notes on October 2023 Patch Day

10Oct 2023

One-Click GNOME Exploit Could Pose Serious Threat to Linux Systems

10Oct 2023

New ‘Grayling’ APT Targeting Organizations in Taiwan, US

10Oct 2023

Twistlock Founders Score Whopping $51M Seed Funding for Gutsy

10Oct 2023

Cable Giant Volex Targeted in Cyberattack

10Oct 2023

Magecart Web Skimmer Hides in 404 Error Pages

10Oct 2023

Researcher Conversations: Natalie Silvanovich From Google’s Project Zero

10Oct 2023

College of Southern Nevada deploys AI avatar to better engage students

10Oct 2023

The CIO’s primary job: Developing future IT leaders

10Oct 2023

8 tips for cultivating a winning IT culture

09Oct 2023

Recently Patched TagDiv Plugin Flaw Exploited to Hack Thousands of WordPress Sites

09Oct 2023

Credential Harvesting Campaign Targets Unpatched NetScaler Instances

09Oct 2023

Patches Prepared for ‘Probably Worst’ cURL Vulnerability

09Oct 2023

Google Expands Bug Bounty Program With Chrome, Cloud CTF Events

09Oct 2023

DC Board of Elections Discloses Data Breach

09Oct 2023

What enterprise software vendors are doing with generative AI

09Oct 2023

CIOs set their agendas to achieve IT’s ultimate balancing act

09Oct 2023

Hackers Join In on Israel-Hamas War With Disruptive Cyberattacks 

07Oct 2023

Taiwan Probes Firms Suspected of Selling Chip Equipment to China’s Huawei Despite US Sanctions

07Oct 2023

Take control of your Oracle unlimited licensing agreement

06Oct 2023

MGM Resorts Says Ransomware Hack Cost $110 Million

06Oct 2023

Android Devices With Backdoored Firmware Found in US Schools

06Oct 2023

Microsoft Releases New Report on Cybercrime, State-Sponsored Cyber Operations

06Oct 2023

In Other News: Funding Increase, Abuse of Smartphone Location Data, Legal Matters

06Oct 2023

Nonprofit Service Provider Blackbaud Settles Data Breach Case for $49.5M With States

06Oct 2023

Organizations Warned of Top 10 Cybersecurity Misconfigurations Seen by CISA, NSA

06Oct 2023

What is a business analyst? A key role for business-IT efficiency

06Oct 2023

CISA Reverses Course on Malicious Exploitation of Video Conferencing Device Flaws

06Oct 2023

ST Engineering showcases applications of new technologies to stay ahead of disruption

05Oct 2023

A CIO’s guide to the developer platform: What it is and why you need it

05Oct 2023

Cisco Plugs Gaping Hole in Emergency Responder Software

05Oct 2023

GitHub Improves Secret Scanning Feature With Expanded Token Validity Checks

05Oct 2023

Red Cross Publishes Rules of Engagement for Hacktivists During War

05Oct 2023

BlackBerry to Split Cybersecurity, IoT Business Units

05Oct 2023

Linux Foundation Announces OpenPubkey Open Source Cryptographic Protocol

05Oct 2023

CISA, NSA Publish Guidance on IAM Challenges for Developers, Vendors

05Oct 2023

Hundreds Download Malicious NPM Package Capable of Delivering Rootkit

05Oct 2023

Qakbot Hackers Continue to Push Malware After Takedown Attempt

05Oct 2023

Addressing the People Problem in Cybersecurity

05Oct 2023

CBRE’s Sandeep Davé on accelerating your AI ambitions

05Oct 2023

7 sins of software development

05Oct 2023

Sony Confirms Data Stolen in Two Recent Hacker Attacks

04Oct 2023

Building sustainability at the edge of the enterprise

04Oct 2023

3 hard truths about GenAI’s large language models

04Oct 2023

Document Security is More than Just Password-Protection

04Oct 2023

Apple Warns of Newly Exploited iOS 17 Kernel Zero-Day

04Oct 2023

Atlassian Ships Urgent Patch for Exploited Confluence Zero-Day

04Oct 2023

New Supermicro BMC Vulnerabilities Could Expose Many Servers to Remote Attacks

04Oct 2023

Lyca Mobile Services Significantly Disrupted by Cyberattack

04Oct 2023

Mozilla Warns of Fake Thunderbird Downloads Delivering Ransomware 

04Oct 2023

Google, Yahoo Boosting Email Spam Protections

04Oct 2023

Severe Glibc Privilege Escalation Vulnerability Impacts Major Linux Distributions

04Oct 2023

Skilled IT pay defined by volatility, security, and AI

04Oct 2023

What a quarter century of digital transformation at PayPal looks like

04Oct 2023

4 reasons why gen AI projects fail

04Oct 2023

Qualcomm Patches 3 Zero-Days Reported by Google

03Oct 2023

Future-Proofing Your Business with Hyperautomation

03Oct 2023

ZDI Discusses First Automotive Pwn2Own

03Oct 2023

Synqly Joins Race to Fix Security, Infrastructure Product Integrations

03Oct 2023

A new solution offers fresh air—not as a dream, but a service

03Oct 2023

Critical TorchServe Flaws Could Expose AI Infrastructure of Major Companies

03Oct 2023

US Executives Targeted in Phishing Attacks Exploiting Flaw in Indeed Job Platform

03Oct 2023

Actor Tom Hanks Warns of Ad With AI Imposter

03Oct 2023

Dozens of Malicious NPM Packages Steal User, System Data

03Oct 2023

Network, Meet Cloud; Cloud, Meet Network

03Oct 2023

ConocoPhillips goes global with digital twins

03Oct 2023

Why all IT talent should be irreplaceable

03Oct 2023

Cybersecurity M&A Roundup: 28 Deals Announced in September 2023

03Oct 2023

Android’s October 2023 Security Updates Patch Two Exploited Vulnerabilities

03Oct 2023

Motel One Discloses Ransomware Attack Impacting Customer Data

03Oct 2023

Companies Address Impact of Exploited Libwebp Vulnerability 

02Oct 2023

Unlocking value: Oracle enterprise license models for optimal ROI

02Oct 2023

Lessons from the field: Why you need a platform engineering practice (…and how to build it)

02Oct 2023

Live Exploitation Underscores Urgency to Patch Critical WS-FTP Server Flaw

02Oct 2023

Number of Internet-Exposed ICS Drops Below 100,000: Report

02Oct 2023

European Telecommunications Standards Institute Discloses Data Breach

02Oct 2023

Johnson Controls Ransomware Attack Could Impact DHS

02Oct 2023

Unpatched Exim Vulnerabilities Expose Many Mail Servers to Attacks 

02Oct 2023

What is a project management office (PMO)? The key to standardizing project success

02Oct 2023

The dark arts of digital transformation — and how to master them

02Oct 2023

Silverfort Open Sources Lateral Movement Detection Tool

02Oct 2023

Recently Patched TeamCity Vulnerability Exploited to Hack Servers

02Oct 2023

CISA Kicks Off Cybersecurity Awareness Month With New Program

30Sep 2023

The changing face of cybersecurity threats in 2023

29Sep 2023

Bankrupt IronNet Shuts Down Operations

29Sep 2023

Should finance organizations bank on Generative AI?

29Sep 2023

AWS Using MadPot Decoy System to Disrupt APTs, Botnets

29Sep 2023

Generative AI Startup Nexusflow Raises $10.6 Million

29Sep 2023

Researchers Extract Sounds From Still Images on Smartphone Cameras

29Sep 2023

In Other News: RSA Encryption Attack, Meta AI Privacy, ShinyHunters Hacker Guilty Plea

29Sep 2023

Embrace the Generative AI revolution: a guide to integrating Generative AI into your operations

29Sep 2023

National Security Agency is Starting an Artificial Intelligence Security Center

29Sep 2023

CISA Warns of Old JBoss RichFaces Vulnerability Being Exploited in Attacks

29Sep 2023

Hackers Set Sights on Apache NiFi Flaw That Exposes Many Organizations to Attacks

29Sep 2023

NIST Publishes Final Version of 800-82r3 OT Security Guide

29Sep 2023

A Key US Government Surveillance Tool Should Face New Limits, a Divided Privacy Oversight Board Says

29Sep 2023

Cloudflare Users Exposed to Attacks Launched From Within Cloudflare: Researchers

29Sep 2023

Top 17 cloud cost management tools — and how to choose

29Sep 2023

10 most in-demand generative AI skills

29Sep 2023

Johnson Controls Hit by Ransomware

29Sep 2023

FBI Warns Organizations of Dual Ransomware, Wiper Attacks

29Sep 2023

US State Department Says 60,000 Emails Taken in Alleged Chinese Hack

28Sep 2023

Progress Software Patches Critical Pre-Auth Flaws in WS_FTP Server Product 

28Sep 2023

Government Shutdown Could Bench 80% of CISA Staff

28Sep 2023

Lumu Raises $30 Million for Threat Detection and Response Platform

28Sep 2023

Verisoul Raises $3.25 Million in Seed Funding to Detect Fake Users

28Sep 2023

Moving From Qualitative to Quantitative Cyber Risk Modeling

28Sep 2023

Russian Zero-Day Acquisition Firm Offers $20 Million for Android, iOS Exploits

28Sep 2023

Cisco Warns of IOS Software Zero-Day Exploitation Attempts

28Sep 2023

Sysdig Launches Realtime Attack Graph for Cloud Environments

28Sep 2023

Qualcomm’s Cisco Sanchez on structuring IT for business growth

28Sep 2023

12 ‘best practices’ IT should avoid at all costs

28Sep 2023

Google Rushes to Patch New Zero-Day Exploited by Spyware Vendor

27Sep 2023

Chinese Gov Hackers Caught Hiding in Cisco Router Firmware

27Sep 2023

CISA Unveils New HBOM Framework to Track Hardware Components

27Sep 2023

Misconfigured TeslaMate Instances Put Tesla Car Owners at Risk

27Sep 2023

Gem Security Lands $23 Million Series A Funding

27Sep 2023

Google Open Sources Binary File Comparison Tool BinDiff

27Sep 2023

Stolen GitHub Credentials Used to Push Fake Dependabot Commits

27Sep 2023

Firefox 118 Patches High-Severity Vulnerabilities

27Sep 2023

macOS 14 Sonoma Patches 60 Vulnerabilities

27Sep 2023

A fluency in business and tech yields success at NATO

27Sep 2023

Gen AI success starts with an effective pilot strategy

27Sep 2023

New GPU Side-Channel Attack Allows Malicious Websites to Steal Data

27Sep 2023

Oracle bolsters distributed cloud, AI strategy with new Mexico cloud region

26Sep 2023

How to ignite innovation and empower more sustainable solutions

26Sep 2023

Zero Trust: Understanding the US government’s requirements for enhanced cybersecurity

26Sep 2023

Microsoft Adding New Security Features to Windows 11

26Sep 2023

Swiss energy services company uses machine learning to see the future

26Sep 2023

Mitigating mayhem in a complex hybrid IT world

26Sep 2023

SAP prepares to add Joule generative AI copilot across its apps

26Sep 2023

How AI can deliver eye-opening insights for IT

26Sep 2023

5 steps we can take to address the cyber skills shortage

26Sep 2023

UAE-Linked APT Targets Middle East Government With New ‘Deadglyph’ Backdoor

26Sep 2023

$200 Million in Cryptocurrency Stolen in Mixin Network Hack

26Sep 2023

Xenomorph Android Banking Trojan Targeting Users in US, Canada

26Sep 2023

The CISO Carousel and its Effect on Enterprise Cybersecurity

26Sep 2023

Sony Investigating After Hackers Offer to Sell Stolen Data

26Sep 2023

Rediscovering the value of information

26Sep 2023

8 questions CIOs should ask to prime their business for gen AI

26Sep 2023

6 IT rules worth breaking — and how to get away with it

25Sep 2023

Stealthy APT Gelsemium Seen Targeting Southeast Asian Government

25Sep 2023

Nigerian Pleads Guilty in US to Million-Dollar BEC Scheme Role

25Sep 2023

900 US Schools Impacted by MOVEit Hack at National Student Clearinghouse

25Sep 2023

City of Dallas Details Ransomware Attack Impact, Costs 

25Sep 2023

Rockwell Automation makes shift to ‘as-a-service’ model

25Sep 2023

10 digital transformation questions every CIO must answer

25Sep 2023

Predator Spyware Delivered to iOS, Android Devices via Zero-Days, MitM Attacks

25Sep 2023

In-the-Wild Exploitation Expected for Critical TeamCity Flaw Allowing Server Takeover

24Sep 2023

Researchers Discover Attempt to Infect Leading Egyptian Opposition Politician With Predator Spyware

22Sep 2023

In Other News: New Analysis of Snowden Files, Yubico Goes Public, Election Hacking

22Sep 2023

China’s Offensive Cyber Operations in Africa Support Soft Power Efforts

22Sep 2023

Air Canada Says Employee Information Accessed in Cyberattack

22Sep 2023

Faster Patching Pace Validates CISA’s KEV Catalog Initiative

22Sep 2023

BIND Updates Patch Two High-Severity DoS Vulnerabilities

22Sep 2023

Top 15 data management platforms available today

22Sep 2023

9 famous analytics and AI disasters

22Sep 2023

Mastercard preps for the post-quantum cybersecurity threat

22Sep 2023

Apple Patches 3 Zero-Days Likely Exploited by Spyware Vendor to Hack iPhones

22Sep 2023

SANS Survey Shows Drop in 2023 ICS/OT Security Budgets

21Sep 2023

Four questions for a casino InfoSec director

21Sep 2023

New ‘Sandman’ APT Group Hitting Telcos With Rare LuaJIT Malware

21Sep 2023

Four Leadership Motions make leading transformative work easier

21Sep 2023

Navigating the Digital Frontier in Cybersecurity Awareness Month 2023

21Sep 2023

Every Network Is Now an OT Network. Can Your Security Keep Up?

21Sep 2023

Legit Security Raises $40 Million in Series B Financing

21Sep 2023

TransUnion Denies Breach After Hacker Publishes Allegedly Stolen Data

21Sep 2023

Car Cybersecurity Study Shows Drop in Critical Vulnerabilities Over Past Decade

21Sep 2023

Atlassian Security Updates Patch High-Severity Vulnerabilities

21Sep 2023

Cisco Boosting Cybersecurity Capabilities With $28 Billion Splunk Acquisition

21Sep 2023

UK’s New Online Safety Law Adds to Crackdown on Big Tech Companies

21Sep 2023

Critical Infrastructure Organizations Warned of Snatch Ransomware Attacks

21Sep 2023

6 deadly sins of enterprise architecture

21Sep 2023

The year’s top 10 enterprise AI trends — so far

21Sep 2023

Omron Patches PLC, Engineering Software Flaws Discovered During ICS Malware Analysis

21Sep 2023

MGM Resorts Computers Back Up After 10 Days as Analysts Eye Effects of Casino Cyberattacks

20Sep 2023

CIOs worry about Gen AI – for all the right reasons

20Sep 2023

So, you’re ready to invest in Universal ZTNA. Here’s what you should know

20Sep 2023

How Zero Trust can help align the CIO and CISO

20Sep 2023

NVIDIA and VMware make AI accessible to enterprises with full-stack accelerated computing

20Sep 2023

Intel Launches New Attestation Service as Part of Trust Authority Portfolio

20Sep 2023

Staying on Topic in an Off Topic World

20Sep 2023

Tor-Based Drug Marketplace Piilopuoti Shut Down by Law Enforcement

20Sep 2023

ServiceNow boasts industry-first gen AI general availability with Vancouver release of Now

20Sep 2023

Atos Unify Vulnerabilities Could Allow Hackers to Backdoor Systems

20Sep 2023

DHS Publishes New Recommendations on Cyber Incident Reporting

20Sep 2023

Discern Security Emerges From Stealth Mode With $3 Million in Funding

20Sep 2023

GitLab Patches Critical Pipeline Execution Vulnerability

20Sep 2023

California Law Restricting Companies’ Use of Information From Kids Online Is Halted by Federal Judge

20Sep 2023

How Mapfre gets cloud to coexist with its tech model ambitions

20Sep 2023

Analyzing the business-case approach Perdue Farms takes to derive value from data

20Sep 2023

5 signs your agile practices will lead to digital disaster

20Sep 2023

SASE Firm Cato Networks Raises $238 Million at $3 Billion Valuation

20Sep 2023

Oracle’s Fusion Cloud CX, ERP, and SCM get generative AI features

20Sep 2023

UK Minister Warns Meta Over End-to-End Encryption

19Sep 2023

CrowdStrike to Acquire Application Intelligence Startup Bionic

19Sep 2023

HiddenLayer Raises Hefty $50M Round for AI Security Tech

19Sep 2023

‘Cybersecurity Incident’ Hits ICC

19Sep 2023

Venafi Leverages Generative AI to Manage Machine Identities

19Sep 2023

The future of ERP: With composable ERP, interoperability and integration are not optional

19Sep 2023

Clorox Blames Damaging Cyberattack for Product Shortage

19Sep 2023

Pakistani APT Uses YouTube-Mimicking RAT to Spy on Android Devices

19Sep 2023

Alcion Raises $21 Million for Backup-as-a-Service Platform

19Sep 2023

Trend Micro Patches Exploited Zero-Day Vulnerability in Endpoint Security Products

19Sep 2023

Thousands of Juniper Appliances Vulnerable to New Exploit 

19Sep 2023

Chinese Hackers Target North American, APAC Firms in Web Skimmer Campaign

19Sep 2023

Hacker Conversations: Casey Ellis, Hacker and Ringmaster at Bugcrowd

19Sep 2023

The DX roadmap: David Rogers on driving digital transformation success

19Sep 2023

12 most popular AI use cases in the enterprise today

19Sep 2023

Cybersecurity M&A Roundup for First Half of September 2023

19Sep 2023

CISA Says Owl Labs Vulnerabilities Requiring Close Physical Range Exploited in Attacks

19Sep 2023

Inside Intermax’s ambitious journey to be a sustainable cloud leader

18Sep 2023

The ‘Great Retraining’: IT upskills for the future

18Sep 2023

Microsoft AI Researchers Expose 38TB of Data, Including Keys, Passwords and Internal Messages

18Sep 2023

OT/IoT and OpenTitan, an Open Source Silicon Root of Trust

18Sep 2023

Google Extends Chromebook Lifespan, Promises 10 Years of Automatic Updates

18Sep 2023

Canadian Government Targeted With DDoS Attacks by Pro-Russia Group

18Sep 2023

Fortinet Patches High-Severity Vulnerabilities in FortiOS, FortiProxy, FortiWeb Products

18Sep 2023

Oracle updates Fusion Cloud suites to aid healthcare firms

18Sep 2023

Two Vegas Casinos Fell Victim to Cyberattacks, Shattering the Image of Impenetrable Casino Security

18Sep 2023

TikTok Is Hit With $368 Million Fine Under Europe’s Strict Data Privacy Rules

18Sep 2023

CISA Releases New Identity and Access Management Guidance

18Sep 2023

Verizon accelerates 5G rollouts with automation platform

18Sep 2023

ICS Security Firm Dragos Raises $74 Million in Series D Extension

18Sep 2023

Imagine Making Shadowy Data Brokers Erase Your Personal Info. Californians May Soon Live the Dream

15Sep 2023

VMware Cross-Cloud Managed Services unleash partner capabilities to help customers become cloud smart

15Sep 2023

Extradited Russian Hacker Behind ‘NLBrute’ Malware Pleads Guilty

15Sep 2023

California Settles With Google Over Location Privacy Practices for $93 Million

15Sep 2023

Pentagon’s 2023 Cyber Strategy Focuses on Helping Allies

15Sep 2023

In Other News: China Blames NSA for Hack, AI Jailbreaks, Netography Spin-Off

15Sep 2023

MGM Hackers Broadening Targets, Monetization Strategies

15Sep 2023

Deduce Raises $9 Million to Fight AI-Generated Identity Fraud

15Sep 2023

Salesforce to hire 3,300 staffers as it eyes generative AI opportunity

15Sep 2023

4 key steps for optimizing your IT services portfolio

15Sep 2023

Transforming the leadership trajectory for women in tech

15Sep 2023

Google Feature Blamed for Retool Breach That Led to Cryptocurrency Firm Hacks 

15Sep 2023

Inside Nasdaq’s AI-fueled pivot to SaaS provider

14Sep 2023

Microsoft, Oracle deliver direct access to Oracle database services on Azure

14Sep 2023

Caesars Confirms Ransomware Hack, Stolen Loyalty Program Database

14Sep 2023

A Second Major British Police Force Suffers a Cyberattack in Less Than a Month

14Sep 2023

The big speed bump on the road to GenAI

14Sep 2023

A One-Two Punch for Security ROI

14Sep 2023

Kubernetes Vulnerability Leads to Remote Code Execution

14Sep 2023

ICS Computers in Western Countries See Increasing Attacks: Report

14Sep 2023

Azure HDInsight Flaws Allowed Data Access, Session Hijacking, Payload Delivery

14Sep 2023

LockBit Affiliate Deploys New 3AM Ransomware in Recent Attack

14Sep 2023

Ransomware Gang Takes Credit for Disruptive MGM Resorts Cyberattack

14Sep 2023

North Korean Hackers Steal $53 Million in Cryptocurrency From CoinEx

14Sep 2023

CIO Brett Lansing’s five-point approach to building followership

14Sep 2023

What is a data engineer? An analytics role in high demand

14Sep 2023

Tech Industry Leaders Endorse Regulating Artificial Intelligence at Rare Summit in Washington

13Sep 2023

DORA and its impact on data sovereignty

13Sep 2023

AuthMind Scores $8.5M Seed Funding for ITDR Tech

13Sep 2023

CISOs and Board Reporting – an Ongoing Problem

13Sep 2023

Distributed Energy Resources Get Cybersecurity Boost with $39M DOE Funding

13Sep 2023

Why your CEO needs to watch a coding video

13Sep 2023

CISA Releases Open Source Software Security Roadmap

13Sep 2023

How Next-Gen Threats Are Taking a Page From APTs

13Sep 2023

US Agencies Publish Cybersecurity Report on Deepfake Threats

13Sep 2023

Airbus Launches Investigation After Hacker Leaks Data

13Sep 2023

macOS Info-Stealer Malware ‘MetaStealer’ Targeting Businesses

13Sep 2023

China Says No Law Banning iPhone Use in Govt Agencies

13Sep 2023

Salesforce plans generative AI boost for ESG reporting with Net Zero Cloud

13Sep 2023

SecurityWeek to Host Cyber AI & Automation Summit

13Sep 2023

SAP Patches Critical Vulnerability Impacting NetWeaver, S/4HANA

13Sep 2023

CISA Offering Free Vulnerability Scanning Service to Water Utilities

13Sep 2023

Eliminate roles, not people: fine-tuning the talent search during times of change

13Sep 2023

New US CIO appointments, September 2023

13Sep 2023

10 mistakes that can tank IT innovation

13Sep 2023

After Apple and Google, Mozilla Also Patches Zero-Day Exploited for Spyware Delivery

12Sep 2023

The CTO’s newest hat is green

12Sep 2023

The extraordinary synergy of wi-fi and 5G in enterprise networks

12Sep 2023

Zero Day Summer: Microsoft Warns of Fresh New Software Exploits

12Sep 2023

Intel Capital Bets on Zenity for Low-Code/No-Code Security

12Sep 2023

Beyond.pl: Addressing sovereign cloud needs in Poland and beyond

12Sep 2023

Salesforce readies Einstein Copilot to unleash generative AI across its offerings

12Sep 2023

Artificial Intelligence in Cybersecurity: Good or Evil?

12Sep 2023

Adobe Says Critical PDF Reader Zero-Day Being Exploited 

12Sep 2023

Zero Trust Security for NIS2 compliance: What you need to know

12Sep 2023

Thousands of Code Packages Vulnerable to Repojacking Attacks

12Sep 2023

Iranian Cyberspies Deployed New Backdoor to 34 Organizations

12Sep 2023

Vector Embeddings – Antidote to Psychotic LLMs and a Cure for Alert Fatigue?

12Sep 2023

ICS Patch Tuesday: Critical CodeMeter Vulnerability Impacts Several Siemens Products

12Sep 2023

China-Linked ‘Redfly’ Group Targeted Power Grid

12Sep 2023

Oracle expects data-hungry generative AI to drive revenue growth

12Sep 2023

Court Convicts Portuguese Hacker in Football Leaks Trial and Gives Him a 4-Year Suspended Sentence

12Sep 2023

Cleafy Raises €10 Million for Online Banking Fraud Prevention Platform

12Sep 2023

Finding Your Way in Cloud Security

12Sep 2023

Schneider Electric leverages AI to help develop employees’ careers

12Sep 2023

7 dark secrets of generative AI

12Sep 2023

DFIR Company Binalyze Raises $19 Million in Series A Funding

12Sep 2023

Google Patches Chrome Zero-Day Reported by Apple, Spyware Hunters

11Sep 2023

Managed services projections increase through 2023

11Sep 2023

MGM Resorts Confirms ‘Cybersecurity Issue’, Shuts Down Systems

11Sep 2023

US Marks 22 Years Since 9/11 Terrorist Attacks

11Sep 2023

Building digital fluency in the C-suite and beyond

11Sep 2023

The digital transformation of an island nation: how Bahrain rose to lead cloud adoption in the GCC Region

11Sep 2023

After Microsoft and X, Hackers Launch DDoS Attack on Telegram

11Sep 2023

Associated Press Stylebook Users Targeted in Phishing Attack Following Data Breach

11Sep 2023

Bookstore Chain Dymocks Discloses Data Breach Possibly Impacting 800k Customers

11Sep 2023

Spies, Hackers, Informants: How China Snoops on the West

11Sep 2023

FBI Blames North Korean Hackers for $41 Million Stake.com Heist

11Sep 2023

What is SAFe? A framework for scaling business agility

11Sep 2023

Vulnerabilities Allow Hackers to Hijack, Disrupt Socomec UPS Devices

10Sep 2023

Powerful Ethnic Militia in Myanmar Repatriates 1,200 Chinese Suspected of Involvement in Cybercrime

08Sep 2023

Governance for responsible AI: The easy things and the hard ones

08Sep 2023

Cisco ASA Zero-Day Exploited in Akira Ransomware Attacks

08Sep 2023

In Other News: LastPass Vault Hacking, Russia Targets Ukraine Energy Facility, NXP Breach 

08Sep 2023

New Phishing Campaign Launched via Google Looker Studio

08Sep 2023

Emsisoft Tells Users to Update Products, Reboot Systems Due to Certificate Mishap

08Sep 2023

J&J enlists AI to streamline joint replacement surgery

08Sep 2023

Is AI in the enterprise ready for primetime? Not yet.

08Sep 2023

US Aeronautical Organization Hacked via Zoho, Fortinet Vulnerabilities 

08Sep 2023

US, UK Sanction More Members of Trickbot Russian Cybercrime Group 

07Sep 2023

Apple Patches Actively Exploited iOS, macOS Zero-Days

07Sep 2023

SAP to buy LeanIX to advance process optimization with AI

07Sep 2023

Rigged Software and Zero-Days: North Korean APT Caught Hacking Security Researchers

07Sep 2023

3 keys to boosting your engineering culture

07Sep 2023

Generative AI: Balancing security with innovation

07Sep 2023

7 ways to ensure the success of product-centric reliability

07Sep 2023

How product-centric engineering has revolutionized Discover

07Sep 2023

Fostering Innovation at Discover Financial Services

07Sep 2023

The multi-cloud era – a faster path forward for enterprises and Managed Services Providers

07Sep 2023

Wealthy Russian With Kremlin Ties Gets 9 Years in Prison for Hacking and Insider Trading Scheme

07Sep 2023

Generative AI’s potential as a force multiplier in defense

07Sep 2023

The Team8 Foundry Method for Selecting Investable Startups

07Sep 2023

See Tickets Alerts 300,000 Customers After Another Web Skimmer Attack

07Sep 2023

‘Atomic macOS Stealer’ Malware Delivered via Malvertising Campaign

07Sep 2023

CISA Releases Guidance on Adopting DDoS Mitigations

07Sep 2023

Tenable to Acquire Cloud Security Firm Ermetic for $240 Million

07Sep 2023

Cisco Patches Critical Vulnerability in BroadWorks Platform

07Sep 2023

Make SASE your cybersecurity armor – but don’t go it alone

07Sep 2023

Cisco Finds 8 Vulnerabilities in OAS Industrial IoT Data Platform

07Sep 2023

Briefing the board on AI: Educate to tee up investment

07Sep 2023

What AI already does well in supply chain management

07Sep 2023

IBM Discloses Data Breach Impacting Janssen Healthcare Platform

06Sep 2023

Crash Dump Error: How a Chinese Espionage Group Exploited Microsoft’s Errors

06Sep 2023

Cash-Strapped IronNet Faces Bankruptcy Options

06Sep 2023

Price shock: IBM to increase cloud costs by up to 26% in 2024

06Sep 2023

Lessons from the field: How Generative AI is shaping software development in 2023

06Sep 2023

Investors Betting Big on Upwind for CNAPP Tech

06Sep 2023

Webinar Tomorrow: Unpacking the Secure Supply Chain Consumption Framework (S2C2F)

06Sep 2023

Dozens of Unpatched Flaws Expose Security Cameras Made by Defunct Company Zavio

06Sep 2023

Thousands of Popular Websites Leaking Secrets

06Sep 2023

Is an integrated ERP suite or a composable ERP strategy right for you?

06Sep 2023

Password-Stealing Chrome Extension Demonstrates New Vulnerabilities

06Sep 2023

25 Major Car Brands Get Failing Marks From Mozilla for Security and Privacy 

06Sep 2023

Android Zero-Day Patched With September 2023 Security Updates 

06Sep 2023

Chrome 116 Update Patches High-Severity Vulnerabilities

06Sep 2023

Hacker Conversations: Alex Ionescu

06Sep 2023

AI is the boost Mercedes-Benz needs to digitally transform

06Sep 2023

7 tough IT security discussions every IT leader must have

06Sep 2023

AtlasVPN to Patch IP Leak Vulnerability After Public Disclosure

06Sep 2023

United Airlines Says the Outage That Held Up Departing Flights Was Not a Cybersecurity Issue

05Sep 2023

Orro: Delivering a sustainable future enabled by the cloud

05Sep 2023

3 hard truths about the multi‑cloud journey

05Sep 2023

How Hackergal is building the talent pipeline of the future

05Sep 2023

How to get the most out of this transformative moment for business technology

05Sep 2023

CISA Hires ‘Mudge’ to Work on Security-by-Design Principles

05Sep 2023

Controlling cloud chaos: How to realign IT with the business

05Sep 2023

MITRE and CISA Release Open Source Tool for OT Attack Emulation

05Sep 2023

9 Vulnerabilities Patched in SEL Power System Management Products 

05Sep 2023

7 Million Users Possibly Impacted by Freecycle Data Breach

05Sep 2023

Okta Says US Customers Targeted in Sophisticated Attacks

05Sep 2023

Norfolk Southern Says a Software Defect — Not a Hacker — Forced It to Park Its Trains This Week

05Sep 2023

The ‘IT Business Office’: Doing IT’s admin work right

05Sep 2023

Estée Lauder applies AI, AR for cosmetics accessibility

05Sep 2023

6 signs an IT manager is struggling — and how to help

05Sep 2023

Ransomware Attack on Fencing Systems Maker Zaun Impacts UK Military Data

05Sep 2023

Cybersecurity M&A Roundup: 40 Deals Announced in August 2023

05Sep 2023

Developers Warned of Malicious PyPI, NPM, Ruby Packages Targeting Macs

01Sep 2023

Exploit Code Published for Critical-Severity VMware Security Defect

01Sep 2023

How Accenture’s solution erases the blind spots of services spend management

01Sep 2023

How to make your developer organization more efficient

01Sep 2023

SAP poaches Microsoft exec as its new global head of AI

01Sep 2023

In Other News: Hacking Encrypted Linux Computers, Android Fuzzing, Skype Leaking IPs

01Sep 2023

Elon Musk Says X, Formerly Twitter, Will Have Voice and Video Calls, Updates Privacy Policy

01Sep 2023

Free Decryptor Available for ‘Key Group’ Ransomware

01Sep 2023

Continuous learning gives U.S. Bank a technology talent edge

01Sep 2023

How Nvidia became a trillion-dollar company

01Sep 2023

Intel embraces SDN to modernize its chip factories

01Sep 2023

Threat Actors Adopt, Modify Open Source ‘SapphireStealer’ Information Stealer

01Sep 2023

Industry Reactions to Qakbot Botnet Disruption: Feedback Friday

01Sep 2023

Over $1 Million Offered at New Pwn2Own Automotive Hacking Contest

01Sep 2023

Sourcegraph Discloses Data Breach Following Access Token Leak

31Aug 2023

IFS acquires Falkonry to offer AI-based enterprise asset management services

31Aug 2023

How prioritizing training and mentorship retains talent

31Aug 2023

Busting 4 common SD-WAN misconceptions

31Aug 2023

Energy Department Offering $9M in Cybersecurity Competition for Small Electric Utilities

31Aug 2023

Vulnerability in WordPress Migration Plugin Exposes Websites to Attacks

31Aug 2023

Five Eyes Report: New Russian Malware Targeting Ukrainian Military Android Devices

31Aug 2023

Apple Preparing iPhone 14 Pro Phones for 2024 Security Research Device Program

31Aug 2023

PenFed to bank on gen AI for hyper-personalization

31Aug 2023

Splunk Patches High-Severity Flaws in Enterprise, IT Service Intelligence

31Aug 2023

Giant Eagle CIO Kirk Ball’s recipe for digital transformation success

31Aug 2023

Boeing CIO Susan Doniz leads with curiosity and empathy

31Aug 2023

Lawsuit Accuses University of Minnesota of Not Doing Enough to Prevent Data Breach

31Aug 2023

Dangling DNS Used to Hijack Subdomains of Major Organizations 

31Aug 2023

500k Impacted by Data Breach at Fashion Retailer Forever 21

30Aug 2023

CIOs are worried about the informal rise of generative AI in the enterprise

30Aug 2023

What motivated Ericsson’s big push into the cloud

30Aug 2023

‘Earth Estries’ Cyberespionage Group Targets Government, Tech Sectors

30Aug 2023

Healthcare Organizations Hit by Cyberattacks Last Year Reported Big Impact, Costs

30Aug 2023

Recent Juniper Flaws Chained in Attacks Following PoC Exploit Publication

30Aug 2023

DreamBus Botnet Exploiting RocketMQ Vulnerability to Delivery Cryptocurrency Miner

30Aug 2023

How Quantum Computing Will Impact Cybersecurity

30Aug 2023

BGP Flaw Can Be Exploited for Prolonged Internet Outages

30Aug 2023

GitHub Enterprise Server Gets New Security Capabilities

30Aug 2023

The portfolio approach to digital transformation: 4 keys to success

30Aug 2023

Fianu Labs Emerges From Stealth With $2 Million in Seed Funding

30Aug 2023

High-Severity Memory Corruption Vulnerabilities Patched in Firefox, Chrome

29Aug 2023

Operation ‘Duck Hunt’: Qakbot Malware Disrupted, $8.6 Million in Cryptocurrency Seized

29Aug 2023

If you’re still focusing on capacity planning, maybe you’re doing VSM wrong

29Aug 2023

VMware Patches Major Security Flaws in Network Monitoring Product

29Aug 2023

New ‘MMRat’ Android Trojan Targeting Users in Southeast Asia

29Aug 2023

TeraSky—Providing award-winning infrastructure modernization solutions with VMware

29Aug 2023

OpenAI Turns to Security to Sell ChatGPT Enterprise

29Aug 2023

Accelerate change with Value Stream Management

29Aug 2023

IBM – Putting technology to work in the real world

29Aug 2023

Did Microsoft Just Upend the Enterprise Browser Market?

29Aug 2023

The Reality of Cyberinsurance in 2023

29Aug 2023

BMC Helix: Leading the charge in Generative AI-driven enterprise service management

29Aug 2023

Meta Fights Sprawling Chinese ‘Spamouflage’ Operation

29Aug 2023

Chinese APT Was Prepared for Remediation Efforts in Barracuda ESG Zero-Day Attack

29Aug 2023

UN Warns Hundreds of Thousands in Southeast Asia Roped Into Online Scams

29Aug 2023

Security Team Huddle: Using the Full NIST Cybersecurity Framework for the Win

29Aug 2023

Personal, Health Information of 1.2 Million Stolen in PurFoods Ransomware Attack

29Aug 2023

Your AI journey: Destined for the ditch?

29Aug 2023

6 trends fueling the rise of self-service IT

28Aug 2023

Telefonica is working to help enterprises decarbonize their operations

28Aug 2023

Discovery Holdings explores the opportunities of multi-cloud without the complexity

28Aug 2023

Equinix goes partner prospecting with AI

28Aug 2023

Digital mining for sustainability in a low-carbon economy

28Aug 2023

P&G enlists IoT, predictive analytics to perfect Pampers diapers

28Aug 2023

How a unified approach to support and services can improve IT outcomes

28Aug 2023

Acquisition Chatter Swirls Around SentinelOne, BlackBerry

28Aug 2023

Signs of Malware Attack Targeting Rust Developers Found on Crates.io

28Aug 2023

10 Million Likely Impacted by Data Breach at French Unemployment Agency

28Aug 2023

Two Men Arrested Following Poland Railway Hacking

28Aug 2023

3 Malware Loaders Detected in 80% of Attacks: Security Firm

28Aug 2023

Leaseweb Reports Cloud Disruptions Due to Cyberattack 

28Aug 2023

Agile project management: Principles, benefits, tools, tips, and when to make the switch

28Aug 2023

2023 CIO Hall of Fame inductees on building a successful IT leadership career

28Aug 2023

Ohio History Organization Says Personal Information Stolen in Ransomware Attack

28Aug 2023

3 Cryptocurrency Firms Suffer Data Breach After Kroll SIM Swapping Attack

25Aug 2023

The four Es of AI: Keeping up with the trend that never sleeps

25Aug 2023

Dear SAP Support – We’ve Grown Apart

25Aug 2023

In Other News: Africa Cybercrime Crackdown, Unpatched macOS Flaw, Investor Disclosures

25Aug 2023

Health check on Tech: CK Birla Hospitals CIO Mitali Biswas on moving the needle towards innovation

25Aug 2023

North Korean APT Hacks Internet Infrastructure Provider via ManageEngine Flaw

25Aug 2023

Europe is Cracking Down on Big Tech. This Is What Will Change When You Sign On

25Aug 2023

Lawmaker Wants Federal Contractors to Have Vulnerability Disclosure Policies 

25Aug 2023

Cypago Raises $13 Million for GRC Automation Platform 

25Aug 2023

Google Workspace Introduces New AI-Powered Security Controls

25Aug 2023

Nearly 1,000 Organizations, 60 Million Individuals Impacted by MOVEit Hack

24Aug 2023

Chinese-backed APT ‘Flax Typhoon’ Hacks Taiwan with Minimal Malware Footprint

24Aug 2023

Regulatory uncertainty overshadows gen AI despite pace of adoption

24Aug 2023

University of Minnesota Confirms Data Breach, Says Ransomware Not Involved

24Aug 2023

Financial IT leaders prep for a quantum-fueled future

24Aug 2023

Mysterious Malware Uses Wi-Fi Scanning to Get Location of Infected Device

24Aug 2023

Cisco Patches Vulnerabilities Exposing Switches, Firewalls to DoS Attacks

24Aug 2023

FBI: Patches for Recent Barracuda ESG Zero-Day Ineffective

24Aug 2023

Generative AI is electrifying. Charge ahead or get shocked.

24Aug 2023

Rockwell ThinManager Vulnerabilities Could Expose Industrial HMIs to Attacks

24Aug 2023

UK Court Concludes Teenager Behind Huge Hacking Campaign

24Aug 2023

Hosting Provider CloudNordic Loses All Customer Data in Ransomware Attack

24Aug 2023

Traders Targeted by Cybercriminals in Attack Exploiting WinRAR Zero-Day 

24Aug 2023

Digital Identity Protection Firm SpyCloud Raises $110 Million

24Aug 2023

CIO Anurag Gupta on taking the private equity plunge

23Aug 2023

AIOps for successful IoT projects

23Aug 2023

Data soup and the art of finding relevance: Why AIOps isn’t enough for modern network monitoring

23Aug 2023

Thoma Bravo Merges ForgeRock with Ping Identity

23Aug 2023

Cybersecurity Companies Report Surge in Ransomware Attacks

23Aug 2023

FBI Finds 1,580 Bitcoin in Crypto Wallets Linked to North Korean Hackers 

23Aug 2023

Smart Cities: Utopian Dream, Security Nightmare, or Political Gimmick?

23Aug 2023

3,000 Openfire Servers Exposed to Attacks Targeting Recent Vulnerability

23Aug 2023

The End of “Groundhog Day” for the Security in the Boardroom Discussion?

23Aug 2023

US Government Publishes Guidance on Migrating to Post-Quantum Cryptography

23Aug 2023

Google opens second cloud region in Germany

23Aug 2023

Examining Cargill’s push to nurture growth through digital and data strategies

23Aug 2023

How Huber spurs innovation in a historically decentralized business

23Aug 2023

First Weekly Chrome Security Update Patches High-Severity Vulnerabilities

23Aug 2023

Exploitation of Ivanti Sentry Zero-Day Confirmed

22Aug 2023

7 project priority checks for overloaded IT agendas

22Aug 2023

Atos—Powering Digital Transformation Across the Customer Lifecycle

22Aug 2023

Safeguarding your digital ecosystem: effective strategies to detect and mitigate API abuse

22Aug 2023

How Vodafone automated sales and operations management

22Aug 2023

US Military Targeted in Recent HiatusRAT Attack

22Aug 2023

Hacker Conversations: Cris Thomas (AKA Space Rogue) From Lopht Heavy Industries

22Aug 2023

TP-Link Smart Bulb Vulnerabilities Expose Households to Hacker Attacks

22Aug 2023

Ransomware Group Starts Leaking Data From Japanese Watchmaking Giant Seiko

22Aug 2023

Australian Energy Software Firm Energy One Hit by Cyberattack

22Aug 2023

Grip Security Lands $41 Million Series B Financing

22Aug 2023

New ‘Carderbee’ APT Targeted Chinese Security Software in Supply Chain Attack

22Aug 2023

Lenovo’s Arthur Hu on the CIO’s customer-centric imperative

22Aug 2023

3 key roles for driving digital success

22Aug 2023

CISA Warns of Another Exploited Adobe ColdFusion Vulnerability

22Aug 2023

Cerby Raises $17 Million for Access Management Platform for Nonstandard Applications

21Aug 2023

Fujitsu – Transforming business and society in the digital age

21Aug 2023

Ivanti Ships Urgent Patch for API Authentication Bypass Vulnerability

21Aug 2023

One company’s innovation reduces carbon footprint – while expanding digital impression

21Aug 2023

How to build a next-gen workforce

21Aug 2023

Researchers Uncover Real Identity of CypherRAT and CraxsRAT Malware Developer

21Aug 2023

Australian Lender Latitude Financial Reports AU$76 Million Cyberattack Costs

21Aug 2023

Flaws in Juniper Switches and Firewalls Can Be Chained for Remote Code Execution

21Aug 2023

Brazilian Hacker Claims Bolsonaro Asked Him to Hack Into the Voting System Ahead of 2022 Vote

21Aug 2023

Webinar Tomorrow:  ZTNA Superpowers CISOs Should Know

21Aug 2023

US Gov Warns of Foreign Intelligence Cyberattacks Against US Space Industry

21Aug 2023

J&J’s Jim Swanson brings mission-driven leadership to the CIO role

21Aug 2023

The 4 most overhyped technologies in IT

21Aug 2023

Tesla Discloses Data Breach Related to Whistleblower Leak

20Aug 2023

Suspected N. Korean Hackers Target S. Korea-US Drills

18Aug 2023

How plusserver strengthens cloud capabilities and helps enterprises reduce their carbon footprint

18Aug 2023

Three technology pain points to address for your employees

18Aug 2023

Jenkins Patches High-Severity Vulnerabilities in Multiple Plugins

18Aug 2023

In Other News: US Hacking China, Unfixed PowerShell Gallery Flaws, Free Train Tickets

18Aug 2023

Lilly revolutionizes clinical trials with intelligent sensor cloud

18Aug 2023

Stealthy ‘LabRat’ Campaign Abuses TryCloudflare to Hide Infrastructure

18Aug 2023

Money Matters: Director – IT and CISO Pushkal Tenjerla of CMS on digital revolution in cash management systems

18Aug 2023

Federally Insured Credit Unions Required to Report Cyber Incidents Within 3 Days

18Aug 2023

Israel, US to Invest $4 Million in Critical Infrastructure Security Projects

18Aug 2023

Companies Respond to ‘Downfall’ Intel CPU Vulnerability 

18Aug 2023

5 rules that transform outsourcing outcomes

17Aug 2023

ProjectDiscovery Lands $25M Investment for Cloud Security Tech

17Aug 2023

The CIO’s call to action on gen AI

17Aug 2023

Google Brings AI Magic to Fuzz Testing With Eye-Opening Results

17Aug 2023

Industrial modernization: Becoming future-ready in uncertain times

17Aug 2023

Rapid7 Says ROI for Ransomware Remains High; Zero-Day Usage Expands

17Aug 2023

Cisco Patches High-Severity Vulnerabilities in Enterprise Applications

17Aug 2023

Malicious QR Codes Used in Phishing Attack Targeting US Energy Company

17Aug 2023

CISA Releases Cyber Defense Plan to Reduce RMM Software Risks

17Aug 2023

Thousands of Systems Turned Into Proxy Exit Nodes via Malware

17Aug 2023

Tech leaders weigh in on the upside and flipside of generative AI

17Aug 2023

What The Clover Group does to address legacy-related challenges

17Aug 2023

Cybersecurity M&A Roundup for August 1-15, 2023

17Aug 2023

Exploitation of Citrix ShareFile Vulnerability Spikes as CISA Issues Warning 

16Aug 2023

Google Releases Security Key Implementation Resilient to Quantum Attacks

16Aug 2023

Ivanti Patches Critical Vulnerability in Avalanche Enterprise MDM Solution

16Aug 2023

Cleaning Products Giant Clorox Takes Systems Offline Following Cyberattack

16Aug 2023

GitHub Paid Out $1.5 Million in Bug Bounties in 2022

16Aug 2023

Chrome 116 Patches 26 Vulnerabilities

16Aug 2023

How Svevia connects roads, risk, and refuse through the cloud

16Aug 2023

Introducing the GenAI models you haven’t heard of yet

16Aug 2023

CIO 100 Award winners prove the transformative value of IT

15Aug 2023

Silicon powers democratized networking

15Aug 2023

2,000 Citrix NetScaler Instances Backdoored via Recent Vulnerability

15Aug 2023

ESM: Delight employees with personalized, accessible digital experiences

15Aug 2023

Hacker Forum Credentials Found on 120,000 PCs Infected With Info-Stealer Malware

15Aug 2023

CISO Conversations: CISOs in Cloud-based Services Discuss the Process of Leadership

15Aug 2023

SecureWorks Laying Off 15% of Employees

15Aug 2023

1.5 Million Impacted by Ransomware Attack at Canadian Dental Service

15Aug 2023

Los Angeles IT secures the vote with open source and the cloud

15Aug 2023

Digi-Key: Creating magic with multi-cloud

14Aug 2023

Colorado Health Agency Says 4 Million Impacted by MOVEit Hack

14Aug 2023

comdivision – Cloud expertise from design to deployment and management

14Aug 2023

Rackspace technology—Award-winning, multi-cloud modernization powered by VMware

14Aug 2023

Huabao sniffs out the ultimate efficiency formula

14Aug 2023

US Shuts Down Bulletproof Hosting Service LolekHosted, Charges Its Polish Operator

14Aug 2023

Power Management Product Flaws Can Expose Data Centers to Damaging Attacks, Spying

14Aug 2023

US Cyber Safety Board to Review Cloud Attacks

14Aug 2023

Email – The System Running Since 71’

14Aug 2023

Cherokee Nation empowers its citizens with IT

14Aug 2023

Micro transformation: Driving big business benefit through quick IT wins

14Aug 2023

Iagona ScrutisWeb Vulnerabilities Could Expose ATMs to Remote Hacking

14Aug 2023

Ford Says Wi-Fi Vulnerability Not a Safety Risk to Vehicles

14Aug 2023

Don’t Expect Quick Fixes in ‘Red-Teaming’ of AI Models. Security Was an Afterthought

11Aug 2023

The best of the best: Inside this year’s CSO50 Awards

11Aug 2023

Enhancing healthcare data privacy & access: the power of tokenization

11Aug 2023

In Other News: macOS Security Reports, Keyboard Spying, VPN Vulnerabilities

11Aug 2023

Northern Ireland’s Top Police Officer Apologizes for ‘Industrial Scale’ Data Breach

11Aug 2023

Microsoft Discloses Codesys Flaws Allowing Shutdown of Industrial Operations, Spying

11Aug 2023

Black Hat USA 2023 – Announcements Summary

11Aug 2023

Rethinking data analytics as a digital-first driver at Dow

11Aug 2023

What is NLP? Natural language processing explained

11Aug 2023

India Passes Data Protection Legislation in Parliament. Critics Fear Privacy Violation

11Aug 2023

MoustachedBouncer: Foreign Embassies in Belarus Likely Targeted via ISPs

10Aug 2023

Check Point to Acquire SASE Security Firm Perimeter 81 for $490 Million

10Aug 2023

How IT does business at Eastman

10Aug 2023

Turkcell Cloud: Bringing sovereign cloud to Turkey’s regulated industries

10Aug 2023

Symmetry Systems Raises $17.7M for Data Security Posture Management Platform

10Aug 2023

Managing and Securing Distributed Cloud Environments

10Aug 2023

European Startup Pistachio Raises €3.25 Million for Cybersecurity Training Platform

10Aug 2023

6 legal ‘gotchas’ that could sink your CIO career

10Aug 2023

CISA Warns Organizations of Exploited Vulnerability Affecting .NET, Visual Studio 

09Aug 2023

Western Digital, Synology NAS Vulnerabilities Exposed Millions of Users’ Files

09Aug 2023

White House Offers Prize Money for Hacker-Thwarting AI

09Aug 2023

What executives should know about CNAPP

09Aug 2023

PepsiCo IT redefines direct-to-store business model success

09Aug 2023

Oracle adds compute services to its Cloud@Customer offering

09Aug 2023

Accelerating generative AI requires the right storage

09Aug 2023

Microsoft Paid Out $13 Million via Bug Bounty Programs for Fourth Consecutive Year

09Aug 2023

Sweet Security Emerges From Stealth With $12 Million Seed Funding and a Cloud Runtime Solution

09Aug 2023

Intel Addresses 80 Firmware, Software Vulnerabilities

09Aug 2023

Cloud Security Firm Kivera Raises $3.5 Million in Seed Funding

09Aug 2023

Automated Security Control Assessment: When Self-Awareness Matters

09Aug 2023

Examining the National Bank of Canada CIO’s approach to tech and teams

09Aug 2023

What is digital transformation? A necessary disruption

09Aug 2023

SAP Patches Critical Vulnerability in PowerDesigner Product

09Aug 2023

40 Vulnerabilities Patched in Android With August 2023 Security Updates

09Aug 2023

New ‘Inception’ Side-Channel Attack Targets AMD Processors

09Aug 2023

Full Steam Ahead: CIO Kopal Raj of WABTEC India on staying ‘on-track’ with AI, IoT and sustainability goals

09Aug 2023

Downfall: New Intel CPU Attack Exposing Sensitive Information

09Aug 2023

Rapid7 Announces Layoffs, Office Closings Under Restructuring Plan

08Aug 2023

Edge Computing: a powerful enabler for industrial frontline workers

08Aug 2023

Patch Tuesday: Microsoft (Finally) Patches Exploited Office Zero-Days

08Aug 2023

Patch Tuesday: Adobe Patches 30 Acrobat, Reader Vulns

08Aug 2023

White House Holds First-Ever Summit on the Ransomware Crisis Plaguing the Nation’s Public Schools

08Aug 2023

Nvidia unveils Workbench for managing AI workloads, updates Omniverse

08Aug 2023

Horizon3 AI Raises $40 Million to Expand Automated Pentesting Platform

08Aug 2023

Protection is No Longer Straightforward – Why More Cybersecurity Solutions Must Incorporate Context

08Aug 2023

ICS Patch Tuesday: Siemens Fixes 7 Vulnerabilities in Ruggedcom Products

08Aug 2023

Identity-Based Attacks Soared in Past Year: Report

08Aug 2023

Black Hat Preview: The Business of Cyber Takes Center Stage

08Aug 2023

UK Think Tank Proposes Greater Ransomware Reporting From Cyberinsurance to Government

08Aug 2023

6 ways CIOs sabotage their IT consultant’s success

08Aug 2023

Microsoft Shares Guidance and Resources for AI Red Teams

08Aug 2023

The great reconciliation: Mitigating technical debt

08Aug 2023

The July 2023 Multi-Cloud Briefing: Generative AI for the Enterprise

08Aug 2023

Unlocking the hidden value of data

08Aug 2023

Efficiency is the name of the game for IT leaders

08Aug 2023

IT leaders know they need to manage IT risk—but need help in execution

07Aug 2023

HPE—Taking an award-winning approach to overcome customer modernization challenges

07Aug 2023

Softchoice—delivering award-winning, end-to-end multi-cloud strategies

07Aug 2023

Wipro — Innovating modern multi-cloud environments for digital transformation

07Aug 2023

4 questions CIOs are asking about cloud computing

07Aug 2023

Cyberinsurance Firm Resilience Raises $100 Million to Expand Its Cyber Risk Platform

07Aug 2023

Groundbreaking HR solution earns BT Group unique SAP Innovation Award honor

07Aug 2023

North Korean Hackers Targeted Russian Missile Developer

07Aug 2023

New PaperCut Vulnerability Allows Remote Code Execution

07Aug 2023

CISA Unveils Cybersecurity Strategic Plan for Next 3 Years

07Aug 2023

Generative AI is a make-or-break moment for CIOs

07Aug 2023

IDC: Pace of enterprise applications sales will increase next year

07Aug 2023

IT leaders embrace the role of business change maker

07Aug 2023

Colorado Department of Higher Education Discloses Ransomware Attack, Data Breach

04Aug 2023

A Cyberattack Has Disrupted Hospitals and Health Care in Five States

04Aug 2023

In Other News: Cybersecurity Funding Rebounds, Cloud Threats, BeyondTrust Vulnerability

04Aug 2023

Microsoft Criticized Over Handling of Critical Power Platform Vulnerability

04Aug 2023

Threat Actors Abuse Cloudflare Tunnel for Persistent Access, Data Theft

04Aug 2023

Points.com Vulnerabilities Allowed Customer Data Theft, Rewards Program Hacking

04Aug 2023

AWS hopes for a savior in AI as revenue growth continues to slow

04Aug 2023

New York Couple Plead Guilty to Bitcoin Laundering

04Aug 2023

What is an automation engineer? A growing role to address IT automation

04Aug 2023

A 4-pronged strategy to cut SaaS sprawl

04Aug 2023

4 ways to ask hard questions about emerging tech risks

04Aug 2023

Exploitation of Ivanti EPMM Flaw Picking Up as New Vulnerability Is Disclosed

04Aug 2023

Five Eyes Agencies Call Attention to Most Frequently Exploited Vulnerabilities

03Aug 2023

CISA Calls Urgent Attention to UEFI Attack Surfaces

03Aug 2023

670 ICS Vulnerabilities Disclosed by CISA in First Half of 2023: Analysis

03Aug 2023

Jericho Security Raises $3 Million for Awareness Training Powered by Generative AI

03Aug 2023

Dozens of RCE Vulnerabilities Impact Milesight Industrial Router

03Aug 2023

Decommissioned Medical Infusion Pumps Expose Wi-Fi Configuration Data

03Aug 2023

These Are the Top Five Cloud Security Risks, Qualys Says

03Aug 2023

NASA, IBM team up to build LLM that can help fight climate change

03Aug 2023

CIO legend Chris Hjelm on developing future-ready IT leaders

03Aug 2023

Lay the groundwork now for advanced analytics and AI

03Aug 2023

Google Awards Over $60,000 for V8 Vulnerabilities Patched With Chrome 115 Update

03Aug 2023

Cybersecurity M&A Roundup: 42 Deals Announced in July 2023

03Aug 2023

Salesforce Email Service Zero-Day Exploited in Phishing Campaign

03Aug 2023

Software Supply Chain Startup Endor Labs Scores Massive $70M Series A Round

02Aug 2023

Beyond compliance: How to pick winning ESG strategies that make a splash

02Aug 2023

Adapt to Changing Regulations with Data Independence and Mobility

02Aug 2023

Microsoft Catches Russian Government Hackers Phishing with Teams Chat App

02Aug 2023

Improving visibility and security in hybrid cloud environments

02Aug 2023

Answer these 4 questions to maximize the ROI of your security toolset

02Aug 2023

Shield and Visibility Solutions Target Phishing From Inside the Browser

02Aug 2023

Revolutionize your site for growth, innovation, and customer satisfaction with composable architecture

02Aug 2023

New hVNC macOS Malware Advertised on Hacker Forum

02Aug 2023

Cyble Raises $24 Million for AI-Powered Threat Intelligence Platform

02Aug 2023

Salesforce launches Starter to ward off competition in the SMB segment

02Aug 2023

Google AMP Abused in Phishing Attacks Aimed at Enterprise Users

02Aug 2023

Firefox 116 Patches High-Severity Vulnerabilities

02Aug 2023

Enterprises enthusiastic about generative AI, Foundry survey shows

02Aug 2023

CIO Ryan Snyder on the benefits of interpreting data as a layer cake

02Aug 2023

10 tips for modernizing legacy apps for the cloud

02Aug 2023

Ivanti Zero-Day Exploited by APT Since at Least April in Norwegian Government Attack

01Aug 2023

Broadcom’s Approach Towards Delivering Customer Value

01Aug 2023

How innovative modular UPSs support digital transformation at edge computing sites

01Aug 2023

Forgepoint Capital Places $20M Series A Bet on Converge Insurance

01Aug 2023

Iran-Run ISP ‘Cloudzy’ Caught Supporting Nation-State APTs, Cybercrime Hacking Groups

01Aug 2023

Nearly All Modern CPUs Leak Data to New Collide+Power Side-Channel Attack

01Aug 2023

Socket Scores $20M as Investors Bet on Software Supply Chain Security Startups

01Aug 2023

This is the easiest AI strategy decision you’ll ever make

01Aug 2023

SpecterOps Updates BloodHound Active Directory Mapping Tool

01Aug 2023

Silk Security Emerges from Stealth With $12.5 Million Seed Funding

01Aug 2023

Nile Raises $175 Million for Secure NaaS Solutions

01Aug 2023

Hacker Conversations: Youssef Sammouda, Bug Bounty Hunter

01Aug 2023

Generative AI usage gains traction among enterprises: McKinsey

01Aug 2023

Invoking IT to help revitalize Indigenous languages at risk of extinction

01Aug 2023

Hyperscalers in crosshairs for anti-competitive pricing and lock-in

01Aug 2023

How generative AI impacts your digital transformation priorities

01Aug 2023

Bedding Giant Tempur Sealy Takes Systems Offline Following Cyberattack

01Aug 2023

Ransomware Attacks on Industrial Organizations Doubled in Past Year: Report

01Aug 2023

200 Canon Printer Models May Expose Wi-Fi Connection Data

01Aug 2023

Possible Chinese Malware in US Systems a ‘Ticking Time Bomb’: Report

31Jul 2023

US Gov Rolls Out National Cyber Workforce, Education Strategy

31Jul 2023

Why Zain Kuwait partnered with BMC Software: An ongoing commitment to service management excellence

31Jul 2023

Simplifying IT strategy: How to avoid the annual planning panic

31Jul 2023

How Bloomberg’s engineers built a culture of knowledge sharing

31Jul 2023

Stack Overflow announces OverflowAI

31Jul 2023

Paper-to-Digital Can Drive Sustainability at Scale

31Jul 2023

Why knowledge management is foundational to AI success

31Jul 2023

The hardest part of building software is not coding, it’s requirements

31Jul 2023

BIT’s Agrobit named a ‘Hero of Sustainability’ at SAP Innovation Awards

31Jul 2023

Atea – Enabling organizations to tame complexity, manage growth

31Jul 2023

Building a Beautiful Data Lakehouse

31Jul 2023

Reddit Taps Fredrick ‘Flee’ Lee for CISO Job

31Jul 2023

Apple Lists APIs That Developers Can Only Use for Good Reason

31Jul 2023

Huawei Unleashes the Power of Technology for a Sustainable, Digital Europe

31Jul 2023

Swiss Re streamlines insurers’ natural disaster response with AI

31Jul 2023

20 issues shaping generative AI strategies today

31Jul 2023

CISA Analyzes Malware Used in Barracuda ESG Attacks

31Jul 2023

Second Ivanti EPMM Zero-Day Vulnerability Exploited in Targeted Attacks

31Jul 2023

Building a successful platform engineering practice

28Jul 2023

5 steps to drive and foster innovation in IT

28Jul 2023

In Other News: Data Breach Cost Rises, Russia Targets Diplomats, Tracker Alerts in Android 

28Jul 2023

US, Australia Issue Warning Over Access Control Vulnerabilities in Web Applications

28Jul 2023

How much advantage does edge offer? And how are organizations using it?

28Jul 2023

Exploitation of Recent Citrix ShareFile RCE Vulnerability Begins

28Jul 2023

Industry Reactions to New SEC Cyber Incident Disclosure Rules: Feedback Friday

28Jul 2023

Zimbra Patches Exploited Zero-Day Vulnerability

28Jul 2023

Embracing neurodiversity in IT for competitive advantage

28Jul 2023

JLL reinvents itself for the AI era

28Jul 2023

Weintek Weincloud Vulnerabilities Allowed Manipulation, Damaging of ICS Devices

28Jul 2023

CoinsPaid Blames North Korean Hackers for $37 Million Cryptocurrency Heist