Digital identity management specialist ForgeRock clearly sees the new open banking regulations popping up across the UK, Europe and New Zealand as a huge opportunity.
Although tacking on another three letters to the already heavily abbreviated 'devops' has the uncomfortable aura of word soup, 'devsecops' is a logical, essential continuation of the devops mindset.
2018 might well be a year Intel would like to forget, especially where its processors are concerned. It has now revealed that millions of its chips have yet another flaw, which could potentially be used by malware to steal sensitive data.
Whether you need a pentesting team, a bug bounty program, or a vulnerability disclosure plan, several crowdsourcing platforms can take the risk and pain from the process.
Malware is a blanket term for viruses, worms, trojans, and other harmful computer programs hackers use it to wreak destruction and gain access to sensitive information. Learn what malware does and how you can remove it—or prevent it.
The FTC and DOJ are pushing companies to provide a means for good-faith security researchers to report bugs and put effective processes in place to act on those reports.
A phishing kit is the back-end to a phishing attack. It's the final step in most cases, where the criminal has replicated a known brand or organization.
IT admins surveyed by Susan Bradley, who moderates the PatchManagement.org mailing list, said Microsoft's current strategy is failing. So she took their concerns to Microsoft leaders, including CEO Satya Nadella, and asked them to make changes.
Blockchain lets the healthcare industry exchange data in a standard format, automate complex processes and apply AI against large silos of medical data. It might even allow patients to sell their data for rewards.
Once the bailiwick of Hollywood special effects studios with multi-million-dollar budgets, now anyone can download deepfake software and use machine learning to make believable fake videos. This makes a lot of people nervous.