Category: Information Security
-
ZDNet: New browser attack lets hackers run bad code even after users leave a web page
ZDNet: New browser attack lets hackers run bad code even after users leave a web page. https://www.zdnet.com/article/new-browser-attack-lets-hackers-run-bad-code-even-after-users-leave-a-web-page/
-
U.S. Senate Banking Committee Invites Feedback on Information Security Issues in Financial Sector – Employment Screening Resources
via U.S. Senate Banking Committee Invites Feedback on Information Security Issues in Financial Sector – Employment Screening Resources
-
TechRepublic: 3 enterprise cybersecurity trends CISOs must pay attention to
TechRepublic: 3 enterprise cybersecurity trends CISOs must pay attention to. https://www.techrepublic.com/article/3-enterprise-cybersecurity-trends-cisos-must-pay-attention-to/
-
An Interview with CISO Billy Spears: Making a Case for Machine Identity Protection – Security Boulevard
via An Interview with CISO Billy Spears: Making a Case for Machine Identity Protection – Security Boulevard
