All articles by CBR Staff Writer
F-Secure Warns Banks Over “Tickle” Vuln: Here’s Two Free Tools to Help
“Expressions in Tcl should always be braced…”
Bank of England Seeks Software to Underpin FX, Balance Sheet Risk Management
BoE continues its systems overhaul…
Sex App Leak Suggests Three in a Bed in 10 Downing Street
There were three in the bed, and a GET request said…
DevSecOps: The Six Pillars of Secure Code Deployment
“You can’t manage what you can’t (or don’t) measure”
This Valve 0Day Could Affect 100 Million Gamers
“I hope this will bring Steam developers to make some security improvements.”
Default Access for ‘Everyone’? New AWS Data Lake Service’s Settings Raise Red Flags for Security Experts
It’s IAM principals, not the public, but AWS “strongly suggests” the defaults are revoked…
Your Top 10 Security Projects: A CISO’s Guide
From cloud security posture management, to CARTA-inspired vulnerability management, CISOs should consider these 10 projects
UK Government To Spend £250 Million Creating a National Artificial Intelligence Lab
“Health tech revolution”
Spotting Email Compromise in Law Firms: Users vs Technology
Phishing, spear phishing, social engineering and diversion fraud cannot be ignored by law firms
Women in Tech: 1 in 3 Told “You Only Got That Job Because You’re a Woman”
“I remember thinking ‘Is this because I’m a woman?”