Validation and verification are important steps in the security patch management lifecycle. They help to determine the impact of a […]
Validation and verification are important steps in the security patch management lifecycle. They help to determine the impact of a […]
A blog about NIS2 compliance and leadership.
To ensure a predictable rollout when a patch is deployed across your network, it is important to test it first […]
In March 2024, Canadian discount store Giant Tiger suffered a data breach that exposed 2.8M customer records. Attributed to a vendor of the retailer, the breach included physical and email addresses, names and phone numbers.
What is identity management (ID management)? Identity management (ID management) is the organizational process for ensuring individuals have the appropriate […]
In April 2024, nearly 6 million records of Salvadoran citizens were published to a popular hacking forum. The data included names, dates of birth, phone numbers, physical addresses and nearly 1M unique email addresses. Further, over 5M corresponding profile photos were also included in the breach.
What is cryptanalysis? Cryptanalysis is the study of ciphertext, ciphers and cryptosystems to understand how they work and to find […]
In March 2024, the independent fan forum Kaspersky Club suffered a data breach. The incident exposed 56k unique email addresses alongside usernames, IP addresses and passwords stored as either MD5 or bcrypt hashes.
Register for the ICS Security Summit to be able to participate in The Quest to Summit.
In March 2024, the Indian audio and wearables brand boAt suffered a data breach that exposed 7.5M customer records. The data included physical and email address, names and phone numbers, all of which were subsequently published to a popular clear web hacking forum.