Marty Milbert at Venafi looks into what happens when a certificate authority is compromised, and discusses how machine-to-machine connections can become victims of risk when organisations fail to understand machine identities.
A team of White Hat hackers recently unearthed the personal details of over 100,000 workers of the United Nations Environment Programme (UNEP) after finding the credentials to Git repositories as
In building an EVP for Ritchie Bros, an online auction platform for heavy equipment, Employer Brand Specialist Thomas Reneau drew from his experience with design thinking firm IDEO. Reneau saw
Russian hacker Andrei Tyurin has been sentenced to twelve years in prison in the United States and ordered to forfeit over $19 million after pleading guilty to hacking JP Morgan
The European Commission has decided to register a European Citizens’ Initiative to ban biometric mass surveillance practices which contends that uses of biometric surveillance in EU states violate EU data
The Competition and Markets Authority (CMA) has opened an investigation into Google’s proposed Privacy Sandbox after receiving complaints that the move could enable Google to abuse its dominant market position,
Operators of the Pysa (or Mespinoza) ransomware have published data stolen from Hackney Council on a dark web forum, months after targeting the council with a cyber attack that disrupted
Nissan North America leaked source codes for various internal tools and applications after it misconfigured a Git repository, letting hackers access its contents and share them on Telegram and hacker
As someone new to the HR industry, I’ve been spending the past month familiarizing myself with commonly-used recruitment processes and technologies among HR professionals and hiring managers. A particular process
Federal intelligence agencies in the United States have publicly stated that the hacking of a SolarWinds update server to infiltrate enterprise networks worldwide was likely the work of a Russian-origin