IoT’s Regulatory Reckoning Is Overdue
New security regulations are more than compliance hurdles — they’re opportunities to build better products, restore trust, and lead the […]
IoT’s Regulatory Reckoning Is Overdue Read Post »
New security regulations are more than compliance hurdles — they’re opportunities to build better products, restore trust, and lead the […]
IoT’s Regulatory Reckoning Is Overdue Read Post »
The Indian government has published a draft version of the Digital Personal Data Protection (DPDP) Rules for public consultation. “Data
India Proposes Digital Data Rules with Tough Penalties and Cybersecurity Requirements Read Post »
Close to $500 million in cryptocurrency from over 332,000 addresses was stolen in 2024 using wallet drainer malware. The post
Wallet Drainer Malware Used to Steal $500 Million in Cryptocurrency in 2024 Read Post »
The post SAQ A-EP: Top 5 Actions Merchants Must Take to comply with PCI DSS 4 Requirements 6.4.3 and 11.6.1
As we begin 2025, artificial intelligence (AI) continues to be both a game-changer and a point of contention in the
2025 predictions: Artificial intelligence (AI) Read Post »
A vulnerability in Nuclei’s template signature verification system could have allowed attackers to execute arbitrary code. The post Code Execution
Code Execution Flaw Found in Nuclei Vulnerability Scanner Read Post »
China is continuing to target U.S. entities in its efforts regarding Taiwan, including using state-sponsored Flax Typhoon to compromise Guam
China’s Salt Typhoon Attacks Guam entity; US Sanctions Chinese Company Read Post »
Join us for our first industry webinar of 2025: Beyond the Perimeter: Addressing Blind Spots in Identity Security for 2025.
Addressing Blind Spots in Identity Security for 2025 Read Post »
Roundup of the thirty-seven cybersecurity-related merger and acquisition (M&A) deals announced in December 2024. The post Cybersecurity M&A Roundup: 37
Cybersecurity M&A Roundup: 37 Deals Announced in December 2024 Read Post »
Torq has extended the reach of the generative artificial intelligence (AI) capabilities spanning its security operations center (SOC) platform to
Torq Adds Bevy of AI Agents to Automate Cybersecurity Workflows Read Post »