The EU CRA – Treating Cybersecurity as Product Liability
For years, cybersecurity law has mostly behaved like tort law after a car crash. It asked who got hurt,...
For years, cybersecurity law has mostly behaved like tort law after a car crash. It asked who got hurt,...
A patient walks into a new hospital. At the front desk, they are asked to fill in their insurance...
“You knew, and you could have acted. Why didn’t you?” This is the question you do not want to be...
Earlier this year, we asked our team where they expect open source cyberattacks to go next. Sonatype Principal Security...
Earlier this year, we asked our team where they expect open source cyberattacks to go next. Sonatype Principal Security...
Mobile Security Start using a new app and you’ll often be asked to grant it permissions. But blindly accepting them...
Counter Threat Unit™ (CTU) researchers are frequently asked about ransomware groups posing a threat to organizations in specific verticals or...