Businesses don’t have sufficient staff to find vulnerabilities or protect against their exploit, according to a new report by Ponemon Institute. Read More HERE
A wireless device resembling an Apple USB-Lightning cable that can exploit any system via keyboard interface highlights risks associated with hardware Trojans and insecure supply chains. Read More HERE
Hacking by external actors caused most breaches, but Web intrusions and exposures compromised more records, according to Risk Based Security. Read More HERE