

Do I Need to Care About Compliancy with Industry Standards? Compliance provides a...
The Drawbacks of Traditional Vulnerability Management Traditional vulnerability...
Overview FortiOS SSL-VPN doesn't validate HTTP requests properly, leading to an overflow...
What Is Phishing? Firstly, let's have a quick recap on phishing. Phishing aims to lure individuals into providing sensitive information, including credit card...
NIS – The EU-Wide Cybersecurity Initiative In July 2016, The current Network and Information Security Directive (NIS Directive) became the first piece of...
Despite the difficult current conditions in the investment market, specialist B2B software venture capital firm Subvenio Invest has led the funding round,...
Gartner IT Symposium/Xpo Conference 2022, Barcelona, Spain, 7 November: Holm Security has given organizations the tools needed to lower the risk of malicious...
Red Herring’s Top 100 Global list has become a mark of distinction for identifying promising companies and outstanding entrepreneurs. Red Herring editors were...
OpenSSL has categorized the issue as critical, a designation it uses to indicate a vulnerability that “affects common configurations” and is likely...