Roger Johnston talks about how aliens, Elvis impersonators and your worst security users can help you find and fix security problems. Senior Editor Sarah D. Scalet recently spoke with Johnston about ...
For modern companies, a small website outage or data breach can spell huge disaster to the organisation’s profits and reputation. This is what makes the job of information technology security officers ...
With recent research from Ivanti revealing that unpatched vulnerabilities remain the most prominent vector for cybercriminals to carry out ransomware attacks, it has never been more critical for ...
The tool is a spreadsheet where users define asset types, hazards, select indicator sets, gather data, convert to scores, rank vulnerability, and integrate results into prioritisation. Steps include: ...
When the Petya cyber-attack was launched in June of this year, just on the heels of the massive WannaCry ransomware outbreak, thousands of computers across the globe were hit, disrupting worldwide ...
The Cloud Security Alliance on April 29 announced several CSAI Foundation milestones aimed at securing agentic AI systems, including a planned catastrophic risk annex, new CVE Numbering Authority ...
A study of 2,100 organisations reveals a global divide in how organisations assess cyber risk, with less than half using strategic vulnerability assessments. Only 48% of organisations polled use ...
Quick Summary Struggling to keep track of security gaps across your systems and applications? Discover the top seven vulnerability scanning tools of 2025 that can help you identify, prioritise, and ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results