September 17, 2024 | International, C4ISR, Security
Shining a Light on Shadow Apps: The Invisible Gateway to SaaS Data Breaches
Learn how shadow apps bypass IT controls, increase SaaS risks, and the role of SSPM in detection
You can refine the results using the filters above.
September 17, 2024 | International, C4ISR, Security
Learn how shadow apps bypass IT controls, increase SaaS risks, and the role of SSPM in detection
September 16, 2024 | International, C4ISR
Early adopters of the Air Force's AI system come from a range of career fields and have used it for a variety of tasks — from content creation to coding.
September 16, 2024 | International, C4ISR
The program aims to create a production capability that specifically addresses military requirements for advanced semiconductors.
September 16, 2024 | International, C4ISR, Security
September 14, 2024 | International, C4ISR
That work is increasingly important for the U.S., which is racing against China to shape the next iteration of wireless telecommunications.
September 14, 2024 | International, Land, C4ISR, Security
The 3rd Infantry Division ran cybersecurity for one of its brigades that was deployed to a challenging and far away training exercise.
September 14, 2024 | International, C4ISR, Security
Ivanti warns of active exploitation of Cloud Appliance flaw CVE-2024-8190. Patch urgently required.
September 14, 2024 | International, C4ISR, Security
17-year-old arrested over cyber attack on TfL, exposing 5,000 customers' sensitive data. Investigation ongoing.
September 14, 2024 | International, C4ISR, Security
Critical WhatsUp Gold vulnerabilities exploited within hours of PoC release. Attackers bypass authentication to install remote access tools.
to not miss any news from the industry
You can customize your subscriptions in the confirmation email.