In an era defined by continuous media announcements of organizations that have suffered both government and private data ...
As technology revolutionizes the way OEMs build cars, this software-powered shift has also introduced new risks and ...
Puppet’s annual State of DevOps Report has tracked trends in IT, including security and, more recently, the growth of ...
Highly advanced and extremely dangerous cyberattacks are targeting SAP (from the company originally called “System Analysis ...
Privileged accounts are highly coveted targets for malicious attackers due to the extensive access they provide. According to ...
The specter of security vulnerabilities is a constant concern in today's digital landscape. They're the hidden pitfalls that ...
Russia’s reputation for suppressing internet freedom and free expression is well documented. VPNs have long had a contentious ...
When our tiny team began our journey at Cyber Defense Media Group (CDMG) together in January 2012, we were happy to help smaller, lesser-known innovators of infosec, get their message out there and ...
Why does our success story matter? The answer is simple - despite many companies making significant cybersecurity investments, there was still a substantial need for self-sustain cybersecurity ...
A central principle in many data protection laws around the globe is data minimization. But we are currently facing a serious issue: we don’t have legal clarity on what exactly the laws require when ...