Security News


Microsoft's security tactics focus on customers, transparency, and working with its tech competitors
Diana Kelley, Microsoft's Cybersecurity Field CTO, talks about the company's approach to data security, collaborating with its major tech competitors, and why the cloud is a security imperative.

Chinese intelligence officers recruited hackers and insiders to help them steal sensitive information from aerospace and technology companies, the U.S. Department of Justice said on Tuesday. read more

Cisco's Michele Guel, Distinguished Engineer and Chief Security Architect, explains how to recruit women into STEM and cybersecurity.

High-Tech Bridge launched ImmuniWeb Discovery AI to conduct the threat-aware risk assessment and inventory of websites and web applications. Insecure and outdated web applications are a core...

Latest Draft Still Imperils Privacy and Security, Organizations ContendThe disagreements continue over Australia's efforts to pass legislation that would help law enforcement counter encryption....

Cyber law changes proposed in Australia specifically state that companies will not be required to implement encryption backdoors, but tech giants are still concerned that the current form of the...

ECRI Institute Calls Attention to Cyber Risks for Second Consecutive YearHackers remotely accessing medical devices and systems - potentially disrupting care and putting patients at risk - is the...

