Amazon Web Services made updates to its identity and access management platform to help developers implement secure, scalable, and customizable authentication solutions for their applications.
Автор: Jennifer Lawinski, Contributing Writer
Cloud Security Startup Wiz to Acquire Dazz in Risk Management Play
Dazz’s remediation engine will boost risk management in Wiz’s cloud security portfolio.
How a Mental Health Nonprofit Secures Endpoints for Compassionate Care
Consolidating endpoint management boosts cybersecurity while keeping an Oklahoma-based nonprofit focused on community mental health.
SWEEPS Educational Initiative Offers Application Security Training
The secure coding curriculum, funded by a $2.5 million grant, is available for students and professionals at all stages of their careers.
EU Adopts Cyber Resilience Act to Regulate Internet of Things
The European Union adopted a new law setting EU-wide cybersecurity requirements for connected devices to ensure their safety.
FHE Consortium Pushes for Quantum-Resilient Cryptography Standards
The FHE Technical Consortium for Hardware (FHETCH) brings together developers, hardware manufacturers and cloud providers to collaborate on technical standards necessary to develop commercial fully homomorphic encryption solutions and lower adoption ba…
EU Plans Sanctions for Cyberattackers Acting on Behalf of Russia
The European Union’s new sanctions framework will target individuals and organizations engaging in pro-Russian activities such as cyberattacks and information manipulation to undermine EU support for Ukraine.
Despite Prevalence of Online Threats, Users Aren’t Changing Behavior
Consumers are victims of online scams and have their data stolen, but they are lagging on adopting security tools to protect themselves.
MITRE Launches AI Incident Sharing Initiative
The collaboration with industry partners will improve collective AI defenses. Trusted contributors receive protected and anonymized data on real-world AI incidents.
NSA Releases 6 Principles of OT Cybersecurity
Organizations can use this guide to make decisions for designing, implementing, and managing OT environments to ensure they are both safe and secure, as well as enable business continuity for critical services.