Why Cyber Change Outpaces Boardroom Engagement
Organizations must avoid the mistakes of the past and build a security-by-design culture that permeates enterprise-wide. Read More HERE…
Organizations must avoid the mistakes of the past and build a security-by-design culture that permeates enterprise-wide. Read More HERE…
Welcome to our weekly roundup, where we share what you need to know about cybersecurity news and events that happened over the past few days. This week, read the third installment of Trend Micro’s Codex series. Also, read about the White House’s latest zero-trust approach to its cybersecurity strategy. Read More HERE…
This week, read about how crucial it is for security teams to adopt an integrated approach to threat detection, such as remote control, and Congress’s plan to update the Federal Information Security Management Act (FISMA) for the first time in eight years. Read More HERE…
In a series of blog posts, we explore different aspects of Codex and assess its capabilities with a focus on the security aspects that affect not only regular developers but also malicious users. This is the second part of the series. Read More HERE…
This week, read about Log4j vulnerabilities in connected cars and charging stations and how iOS malware can fake iPhone shutdowns to snoop on cameras and microphones. Read More HERE…
The first of a series of blog posts examines the security risks of Codex, a code generator powered by the GPT-3 engine. Read More HERE…
This week, read about Log4j vulnerabilities in connected cars and charging stations and how iOS malware can fake iPhone shutdowns to snoop on cameras and microphones. Read More HERE…
Read about the Log4j story, an analysis of the impact and what to do next. Read More HERE…
This week, read on Purple Fox’s infection chain observed by Trend Micro’s Managed XDR. Also, learn about the Log4j vulnerability that has the potential to cause ‘incalculable’ damage. Read More HERE…