Cybersecurity once conjured images of IT departments, server rooms and corporate firewalls. Today, it extends far beyond ...
Sonatype, Snyk and Black Duck remained atop Forrester's software composition analysis rankings as commoditization of core ...
Cybersecurity researchers have discovered the first-ever UEFI bootkit designed to target Linux systems and subvert their boot ...
A Russian cyberespionage group hacked a Washington, D.C.-based organization focused on Ukraine by deploying a new attack ...
The U.S. Department of Defense is seeking industry proposals for a new artificial intelligence contract vehicle to help ...
Will the indictment of five alleged members of the loosely affiliated Scattered Spider cybercrime group disrupt its wider ...
The role of CISOs is evolving beyond a technical leadership position to a more strategic one. As cybersecurity threats grow ...
Covering topics in risk management, compliance, fraud, and information security.
Das has 21 years of experience in supervisory, operational and functional roles in information security, ICT, governance, compliance, risk management and satellite communication. He actively handled ...
Identity verification was historically used for regulated onboarding in industries like banking, gambling and cryptocurrency, ...