All Articles

Ordered by Date Received : Year: "2024"
Page: 1 (of 1,542) > >>

Total Articles in this collection: 77,149

Navigation Help at the bottom of the page
Article: Apple Vision Pro Ecosystem Shows Sluggish Growth - published 18 minutes ago.
Content: Apple's pricey Vision Pro augmented reality/virtual reality (AR/VR) headset hasn't been a magnet for developers. The Wall Street Journal reported Sunday that there has been a significant slowdown in apps being introduced in the Vision Pro app store. The post Apple Vision Pro Ecosystem Shows Sluggish Growth appeared first on TechNewsWorld. ...
https://www.technewsworld.com/story/apple-vision-pro-ecosystem-shows-sluggish-growth-179423.html?rss=1   
Published: 2024 10 15 12:00:24
Received: 2024 10 15 12:02:35
Feed: TechNewsWorld
Source: TechNewsWorld
Category: News
Topic: Cyber Security
Article: Apple Vision Pro Ecosystem Shows Sluggish Growth - published 18 minutes ago.
Content: Apple's pricey Vision Pro augmented reality/virtual reality (AR/VR) headset hasn't been a magnet for developers. The Wall Street Journal reported Sunday that there has been a significant slowdown in apps being introduced in the Vision Pro app store. The post Apple Vision Pro Ecosystem Shows Sluggish Growth appeared first on TechNewsWorld. ...
https://www.technewsworld.com/story/apple-vision-pro-ecosystem-shows-sluggish-growth-179423.html?rss=1   
Published: 2024 10 15 12:00:24
Received: 2024 10 15 12:02:35
Feed: TechNewsWorld
Source: TechNewsWorld
Category: News
Topic: Cyber Security
Article: FIDO Alliance Working on Making Passkeys Portable Across Platforms - published 20 minutes ago.
Content:
https://www.macrumors.com/2024/10/15/fido-alliance-portable-passkeys-across-platforms/   
Published: 2024 10 15 11:58:33
Received: 2024 10 15 12:02:31
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Article: FIDO Alliance Working on Making Passkeys Portable Across Platforms - published 20 minutes ago.
Content:
https://www.macrumors.com/2024/10/15/fido-alliance-portable-passkeys-across-platforms/   
Published: 2024 10 15 11:58:33
Received: 2024 10 15 12:02:31
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Article: Container Hardening Process - published 28 minutes ago.
Content: submitted by /u/citypw [link] [comments]
https://www.reddit.com/r/netsec/comments/1g45rxv/container_hardening_process/   
Published: 2024 10 15 11:50:05
Received: 2024 10 15 11:59:42
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Article: Container Hardening Process - published 28 minutes ago.
Content: submitted by /u/citypw [link] [comments]
https://www.reddit.com/r/netsec/comments/1g45rxv/container_hardening_process/   
Published: 2024 10 15 11:50:05
Received: 2024 10 15 11:59:42
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Score Summary
Cyber Tzar Score Summary
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Article: How Ernst & Young’s AI platform is ‘radically’ reshaping operations - published about 2 hours ago.
Content:
https://www.computerworld.com/article/3560355/how-ernst-youngs-ai-platform-is-radically-reshaping-operations.html   
Published: 2024 10 15 10:00:00
Received: 2024 10 15 11:58:22
Feed: Computerworld Security News
Source: Computerworld Security News
Category: Cyber Security
Topic: Cyber Security
Article: How Ernst & Young’s AI platform is ‘radically’ reshaping operations - published about 2 hours ago.
Content:
https://www.computerworld.com/article/3560355/how-ernst-youngs-ai-platform-is-radically-reshaping-operations.html   
Published: 2024 10 15 10:00:00
Received: 2024 10 15 11:58:22
Feed: Computerworld Security News
Source: Computerworld Security News
Category: Cyber Security
Topic: Cyber Security
Article: Microsoft’s AI research VP joins OpenAI amid fight for top AI talent - published 36 minutes ago.
Content:
https://www.computerworld.com/article/3564352/microsofts-ai-research-vp-joins-openai-amid-fight-for-top-ai-talent.html   
Published: 2024 10 15 11:42:56
Received: 2024 10 15 11:58:22
Feed: Computerworld Security News
Source: Computerworld Security News
Category: Cyber Security
Topic: Cyber Security
Article: Microsoft’s AI research VP joins OpenAI amid fight for top AI talent - published 36 minutes ago.
Content:
https://www.computerworld.com/article/3564352/microsofts-ai-research-vp-joins-openai-amid-fight-for-top-ai-talent.html   
Published: 2024 10 15 11:42:56
Received: 2024 10 15 11:58:22
Feed: Computerworld Security News
Source: Computerworld Security News
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: Breaching the Data Perimeter: CloudTrail as a mechanism for Data Exfiltration - published 40 minutes ago.
Content: submitted by /u/tracebit [link] [comments]...
https://www.reddit.com/r/netsec/comments/1g45ksx/breaching_the_data_perimeter_cloudtrail_as_a/   
Published: 2024 10 15 11:38:12
Received: 2024 10 15 11:40:34
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Article: Breaching the Data Perimeter: CloudTrail as a mechanism for Data Exfiltration - published 40 minutes ago.
Content: submitted by /u/tracebit [link] [comments]...
https://www.reddit.com/r/netsec/comments/1g45ksx/breaching_the_data_perimeter_cloudtrail_as_a/   
Published: 2024 10 15 11:38:12
Received: 2024 10 15 11:40:34
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Article: It Seemed Like an AI Crime-Fighting Super Tool. Then Defense Attorneys Started Asking Questions - published about 1 hour ago.
Content:
https://www.wired.com/story/cybercheck-crime-reports-prosecutions/   
Published: 2024 10 15 11:00:00
Received: 2024 10 15 11:21:26
Feed: Wired.com – Security Feed
Source: Wired
Category: News
Topic: Cyber Security
Article: It Seemed Like an AI Crime-Fighting Super Tool. Then Defense Attorneys Started Asking Questions - published about 1 hour ago.
Content:
https://www.wired.com/story/cybercheck-crime-reports-prosecutions/   
Published: 2024 10 15 11:00:00
Received: 2024 10 15 11:21:26
Feed: Wired.com – Security Feed
Source: Wired
Category: News
Topic: Cyber Security
Article: More Details on Israel Sabotaging Hezbollah Pagers and Walkie-Talkies - published about 1 hour ago.
Content: The Washington Post has a long and detailed story about the operation that’s well worth reading (alternate version here). The sales pitch came from a marketing official trusted by Hezbollah with links to Apollo. The marketing official, a woman whose identity and nationality officials declined to reveal, was a former Middle East sales representative for the T...
https://www.schneier.com/blog/archives/2024/10/more-details-on-israel-sabotaging-hezbollah-pagers-and-walkie-talkies.html   
Published: 2024 10 15 11:06:44
Received: 2024 10 15 11:19:45
Feed: Schneier on Security
Source: Schneier on Security
Category: Cyber Security
Topic: Cyber Security
Article: More Details on Israel Sabotaging Hezbollah Pagers and Walkie-Talkies - published about 1 hour ago.
Content: The Washington Post has a long and detailed story about the operation that’s well worth reading (alternate version here). The sales pitch came from a marketing official trusted by Hezbollah with links to Apollo. The marketing official, a woman whose identity and nationality officials declined to reveal, was a former Middle East sales representative for the T...
https://www.schneier.com/blog/archives/2024/10/more-details-on-israel-sabotaging-hezbollah-pagers-and-walkie-talkies.html   
Published: 2024 10 15 11:06:44
Received: 2024 10 15 11:19:45
Feed: Schneier on Security
Source: Schneier on Security
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Score Analysis
Cyber Tzar Score Analysis
Article: DevSecOps Practice Lead at Relevance Lab - JoinDevOps - published about 15 hours ago.
Content: The Practice Lead will lead and manage the DevSecOps practice, implement security measures in DevOps processes, and drive continuous improvement in ...
https://jobs.joindevops.com/jobs/87636316-devsecops-practice-lead   
Published: 2024 10 14 21:32:50
Received: 2024 10 15 11:03:21
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: DevSecOps Practice Lead at Relevance Lab - JoinDevOps - published about 15 hours ago.
Content: The Practice Lead will lead and manage the DevSecOps practice, implement security measures in DevOps processes, and drive continuous improvement in ...
https://jobs.joindevops.com/jobs/87636316-devsecops-practice-lead   
Published: 2024 10 14 21:32:50
Received: 2024 10 15 11:03:21
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Cyber Tzar Risk Impact Distribution
Cyber Tzar Risk Impact Distribution
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: Kaia Health Senior DevSecOps Engineer | Welcome to the Jungle (formerly Otta) - published about 13 hours ago.
Content: Apply for Kaia Health Senior DevSecOps Engineer on Welcome to the Jungle (formerly Otta}. Architects, designs, implements, maintains and ope.
https://app.welcometothejungle.com/jobs/ajEzdzQx/company   
Published: 2024 10 14 23:02:38
Received: 2024 10 15 11:03:20
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: Kaia Health Senior DevSecOps Engineer | Welcome to the Jungle (formerly Otta) - published about 13 hours ago.
Content: Apply for Kaia Health Senior DevSecOps Engineer on Welcome to the Jungle (formerly Otta}. Architects, designs, implements, maintains and ope.
https://app.welcometothejungle.com/jobs/ajEzdzQx/company   
Published: 2024 10 14 23:02:38
Received: 2024 10 15 11:03:20
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: devsecops - Jon Dowdle - published about 11 hours ago.
Content: As a responsible and security conscious engineer, you likely want to avoid the professional and reputational hazard associated with a sloppy security ...
https://jondowdle.com/tags/devsecops/   
Published: 2024 10 15 00:52:53
Received: 2024 10 15 11:03:20
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: devsecops - Jon Dowdle - published about 11 hours ago.
Content: As a responsible and security conscious engineer, you likely want to avoid the professional and reputational hazard associated with a sloppy security ...
https://jondowdle.com/tags/devsecops/   
Published: 2024 10 15 00:52:53
Received: 2024 10 15 11:03:20
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Cyber Tzar Risk Impact Assesment
Cyber Tzar Risk Impact Assesment
Article: DevSecOps Engineer in Oceanside, California, United States - Parsons Corporation Jobs - published about 7 hours ago.
Content: DevSecOps Engineer in Oceanside, California. In a world of possibilities, pursue one with endless opportunities. Imagine Next! When it comes ...
https://parsons.jobs/oceanside-ca/devsecops-engineer/81E499354493412BBC4BDEA8028B0BD1/job/   
Published: 2024 10 15 05:29:53
Received: 2024 10 15 11:03:19
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: DevSecOps Engineer in Oceanside, California, United States - Parsons Corporation Jobs - published about 7 hours ago.
Content: DevSecOps Engineer in Oceanside, California. In a world of possibilities, pursue one with endless opportunities. Imagine Next! When it comes ...
https://parsons.jobs/oceanside-ca/devsecops-engineer/81E499354493412BBC4BDEA8028B0BD1/job/   
Published: 2024 10 15 05:29:53
Received: 2024 10 15 11:03:19
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Article: iPhone 18 to Use Enhanced 2nm Chip Tech Integrating 12GB RAM - published about 2 hours ago.
Content:
https://www.macrumors.com/2024/10/15/iphone-18-enhanced-2nm-chip-12gb-ram/   
Published: 2024 10 15 10:45:09
Received: 2024 10 15 11:02:40
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Article: iPhone 18 to Use Enhanced 2nm Chip Tech Integrating 12GB RAM - published about 2 hours ago.
Content:
https://www.macrumors.com/2024/10/15/iphone-18-enhanced-2nm-chip-12gb-ram/   
Published: 2024 10 15 10:45:09
Received: 2024 10 15 11:02:40
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Article: JFrog与IDC合作研究显示:开发人员在软件安全方面耗时日益增加 - 新浪财经 - published about 3 hours ago.
Content: 由JFrog 赞助的IDC信息简报《DevSecOps的隐性成本:开发人员的时间评估》显示,50%的高级开发人员、团队领导、产品负责人和开发经理每周花费在软件安全相关任务上 ...
https://finance.sina.com.cn/tech/roll/2024-10-15/doc-incsrkft4442243.shtml   
Published: 2024 10 15 09:06:30
Received: 2024 10 15 10:43:14
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: JFrog与IDC合作研究显示:开发人员在软件安全方面耗时日益增加 - 新浪财经 - published about 3 hours ago.
Content: 由JFrog 赞助的IDC信息简报《DevSecOps的隐性成本:开发人员的时间评估》显示,50%的高级开发人员、团队领导、产品负责人和开发经理每周花费在软件安全相关任务上 ...
https://finance.sina.com.cn/tech/roll/2024-10-15/doc-incsrkft4442243.shtml   
Published: 2024 10 15 09:06:30
Received: 2024 10 15 10:43:14
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Cyber Tzar Risk Groups Explained
Cyber Tzar Risk Groups Explained
Article: Responding to a cyber incident – what’s your plan? - published about 2 months ago.
Content: You may have heard the phrase that it is not ‘if’ but ‘when’ you suffer a successful cyber-attack, so you may well be asking the question as to what things should your business or organisation need to be considering? Being the victim of a cyber-attack can be particularly challenging, with risk-based decisions required to protect your business continuity and ...
https://www.wcrcentre.co.uk/post/cyber-incident-plan   
Published: 2024 08 21 07:00:12
Received: 2024 10 15 10:43:11
Feed: The Cyber Resilience Centre for Wales
Source: National Cyber Resilience Centre Group
Category: News
Topic: Cyber Security
Article: Responding to a cyber incident – what’s your plan? - published about 2 months ago.
Content: You may have heard the phrase that it is not ‘if’ but ‘when’ you suffer a successful cyber-attack, so you may well be asking the question as to what things should your business or organisation need to be considering? Being the victim of a cyber-attack can be particularly challenging, with risk-based decisions required to protect your business continuity and ...
https://www.wcrcentre.co.uk/post/cyber-incident-plan   
Published: 2024 08 21 07:00:12
Received: 2024 10 15 10:43:11
Feed: The Cyber Resilience Centre for Wales
Source: National Cyber Resilience Centre Group
Category: News
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Score Analysis
Cyber Tzar Score Analysis
Article: Incident response – The dos and don’ts when your business falls victim to a cyber-attack - published about 1 month ago.
Content: The Cyber Resilience Centre for Wales (WCRC) and global technology leader Thales have joined forces to support decision makers and small business managers with cybersecurity. Their event*, ‘Incident response – The dos and don’ts when your business falls victim to a cyber-attack’ is set to offer attendees the opportunity to be taken through a realistic sc...
https://www.wcrcentre.co.uk/post/incident-response-the-dos-and-don-ts-when-your-business-falls-victim-to-a-cyber-attack   
Published: 2024 09 02 09:57:52
Received: 2024 10 15 10:43:10
Feed: The Cyber Resilience Centre for Wales
Source: National Cyber Resilience Centre Group
Category: News
Topic: Cyber Security
Article: Incident response – The dos and don’ts when your business falls victim to a cyber-attack - published about 1 month ago.
Content: The Cyber Resilience Centre for Wales (WCRC) and global technology leader Thales have joined forces to support decision makers and small business managers with cybersecurity. Their event*, ‘Incident response – The dos and don’ts when your business falls victim to a cyber-attack’ is set to offer attendees the opportunity to be taken through a realistic sc...
https://www.wcrcentre.co.uk/post/incident-response-the-dos-and-don-ts-when-your-business-falls-victim-to-a-cyber-attack   
Published: 2024 09 02 09:57:52
Received: 2024 10 15 10:43:10
Feed: The Cyber Resilience Centre for Wales
Source: National Cyber Resilience Centre Group
Category: News
Topic: Cyber Security
Article: Millions of People Are Using Abusive AI ‘Nudify’ Bots on Telegram - published about 2 hours ago.
Content:
https://www.wired.com/story/ai-deepfake-nudify-bots-telegram/   
Published: 2024 10 15 10:30:00
Received: 2024 10 15 10:41:28
Feed: Wired.com – Security Feed
Source: Wired
Category: News
Topic: Cyber Security
Article: Millions of People Are Using Abusive AI ‘Nudify’ Bots on Telegram - published about 2 hours ago.
Content:
https://www.wired.com/story/ai-deepfake-nudify-bots-telegram/   
Published: 2024 10 15 10:30:00
Received: 2024 10 15 10:41:28
Feed: Wired.com – Security Feed
Source: Wired
Category: News
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Motivating developers to write secure code - published over 2021 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/motivating-developers-to-write-secure-code   
Published: 0003 03 11 13:37:00
Received: 2024 10 15 10:21:09
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Motivating developers to write secure code - published over 2021 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/motivating-developers-to-write-secure-code   
Published: 0003 03 11 13:37:00
Received: 2024 10 15 10:21:09
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: NCSC’s Cyber Advisor scheme milestone - published about 1581 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/ncsc-cyber-advisor-scheme-milestone   
Published: 0443 09 04 07:23:14
Received: 2024 10 15 10:21:09
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: NCSC’s Cyber Advisor scheme milestone - published about 1581 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/ncsc-cyber-advisor-scheme-milestone   
Published: 0443 09 04 07:23:14
Received: 2024 10 15 10:21:09
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Supplier assurance: having confidence in your suppliers - published almost 4 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/supplier-assurance-having-confidence-in-your-suppliers   
Published: 2020 12 17 13:26:12
Received: 2024 10 15 10:21:03
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Supplier assurance: having confidence in your suppliers - published almost 4 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/supplier-assurance-having-confidence-in-your-suppliers   
Published: 2020 12 17 13:26:12
Received: 2024 10 15 10:21:03
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: The strength of the ICS COI is the team - published over 3 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/strength-of-ics-coi-is-the-team   
Published: 2021 02 09 16:43:41
Received: 2024 10 15 10:21:03
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: The strength of the ICS COI is the team - published over 3 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/strength-of-ics-coi-is-the-team   
Published: 2021 02 09 16:43:41
Received: 2024 10 15 10:21:03
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Risk Impact Assesment
Cyber Tzar Risk Impact Assesment
Article: Cyber security for high profile conferences - published over 3 years ago.
Content:
https://www.ncsc.gov.uk/guidance/cyber-security-for-high-profile-conferences   
Published: 2021 04 30 06:11:30
Received: 2024 10 15 10:21:02
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Cyber security for high profile conferences - published over 3 years ago.
Content:
https://www.ncsc.gov.uk/guidance/cyber-security-for-high-profile-conferences   
Published: 2021 04 30 06:11:30
Received: 2024 10 15 10:21:02
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Use of Russian technology products and services following the invasion of Ukraine - published over 2 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/use-of-russian-technology-products-services-following-invasion-ukraine   
Published: 2022 03 13 10:17:10
Received: 2024 10 15 10:20:59
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Use of Russian technology products and services following the invasion of Ukraine - published over 2 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/use-of-russian-technology-products-services-following-invasion-ukraine   
Published: 2022 03 13 10:17:10
Received: 2024 10 15 10:20:59
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: What does the NCSC think of password managers? - published about 2 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/what-does-ncsc-think-password-managers   
Published: 2022 07 29 08:26:20
Received: 2024 10 15 10:20:55
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: What does the NCSC think of password managers? - published about 2 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/what-does-ncsc-think-password-managers   
Published: 2022 07 29 08:26:20
Received: 2024 10 15 10:20:55
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Re-Score Report
Cyber Tzar Re-Score Report
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: Spray you, spray me: defending against password spraying attacks - published about 2 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/spray-you-spray-me-defending-against-password-spraying-attacks   
Published: 2022 09 10 19:12:11
Received: 2024 10 15 10:20:55
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Spray you, spray me: defending against password spraying attacks - published about 2 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/spray-you-spray-me-defending-against-password-spraying-attacks   
Published: 2022 09 10 19:12:11
Received: 2024 10 15 10:20:55
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Asset management - published almost 2 years ago.
Content:
https://www.ncsc.gov.uk/guidance/asset-management   
Published: 2022 10 26 15:13:04
Received: 2024 10 15 10:20:54
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Asset management - published almost 2 years ago.
Content:
https://www.ncsc.gov.uk/guidance/asset-management   
Published: 2022 10 26 15:13:04
Received: 2024 10 15 10:20:54
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Using MSPs to administer your cloud services - published almost 2 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/using-msps-to-administer-your-cloud-services   
Published: 2023 01 10 12:06:02
Received: 2024 10 15 10:20:54
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Using MSPs to administer your cloud services - published almost 2 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/using-msps-to-administer-your-cloud-services   
Published: 2023 01 10 12:06:02
Received: 2024 10 15 10:20:54
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Risk Groups Explained
Cyber Tzar Risk Groups Explained
Article: Researching the hard problems in hardware security - published 10 months ago.
Content:
https://www.ncsc.gov.uk/blog-post/introducing-hardware-security-problem-book   
Published: 2023 12 11 09:14:00
Received: 2024 10 15 10:20:49
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Researching the hard problems in hardware security - published 10 months ago.
Content:
https://www.ncsc.gov.uk/blog-post/introducing-hardware-security-problem-book   
Published: 2023 12 11 09:14:00
Received: 2024 10 15 10:20:49
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Guidance for organisations considering payment in ransomware incidents - published 5 months ago.
Content:
https://www.ncsc.gov.uk/guidance/organisations-considering-payment-in-ransomware-incidents   
Published: 2024 05 04 20:09:12
Received: 2024 10 15 10:20:45
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Guidance for organisations considering payment in ransomware incidents - published 5 months ago.
Content:
https://www.ncsc.gov.uk/guidance/organisations-considering-payment-in-ransomware-incidents   
Published: 2024 05 04 20:09:12
Received: 2024 10 15 10:20:45
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Accessibility as a cyber security priority - published 5 months ago.
Content:
https://www.ncsc.gov.uk/blog-post/accessibility-as-a-cyber-security-priority   
Published: 2024 05 09 13:07:44
Received: 2024 10 15 10:20:44
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Accessibility as a cyber security priority - published 5 months ago.
Content:
https://www.ncsc.gov.uk/blog-post/accessibility-as-a-cyber-security-priority   
Published: 2024 05 09 13:07:44
Received: 2024 10 15 10:20:44
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Raising the cyber resilience of software 'at scale' - published 5 months ago.
Content:
https://www.ncsc.gov.uk/blog-post/raising-cyber-resilience-software-at-scale   
Published: 2024 05 31 13:31:13
Received: 2024 10 15 10:20:43
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Raising the cyber resilience of software 'at scale' - published 5 months ago.
Content:
https://www.ncsc.gov.uk/blog-post/raising-cyber-resilience-software-at-scale   
Published: 2024 05 31 13:31:13
Received: 2024 10 15 10:20:43
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Application Development Guidance: Introduction - published 4 months ago.
Content:
https://www.ncsc.gov.uk/guidance/application-development-guidance-introduction   
Published: 2024 06 07 10:07:39
Received: 2024 10 15 10:20:43
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Application Development Guidance: Introduction - published 4 months ago.
Content:
https://www.ncsc.gov.uk/guidance/application-development-guidance-introduction   
Published: 2024 06 07 10:07:39
Received: 2024 10 15 10:20:43
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Online gaming for families and individuals - published 3 months ago.
Content:
https://www.ncsc.gov.uk/guidance/online-gaming-for-families-and-individuals   
Published: 2024 07 22 02:05:45
Received: 2024 10 15 10:20:42
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Online gaming for families and individuals - published 3 months ago.
Content:
https://www.ncsc.gov.uk/guidance/online-gaming-for-families-and-individuals   
Published: 2024 07 22 02:05:45
Received: 2024 10 15 10:20:42
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: SBOMs and the importance of inventory - published about 1 month ago.
Content:
https://www.ncsc.gov.uk/blog-post/sboms-and-the-importance-of-inventory   
Published: 2024 09 14 19:28:09
Received: 2024 10 15 10:20:39
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: SBOMs and the importance of inventory - published about 1 month ago.
Content:
https://www.ncsc.gov.uk/blog-post/sboms-and-the-importance-of-inventory   
Published: 2024 09 14 19:28:09
Received: 2024 10 15 10:20:39
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: 'PDNS for Schools' to provide cyber resilience for more institutions - published 1 day ago.
Content:
https://www.ncsc.gov.uk/blog-post/pdns-for-schools-provide-cyber-resilience-for-more-institutions   
Published: 2024 10 14 11:02:43
Received: 2024 10 15 10:20:38
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: 'PDNS for Schools' to provide cyber resilience for more institutions - published 1 day ago.
Content:
https://www.ncsc.gov.uk/blog-post/pdns-for-schools-provide-cyber-resilience-for-more-institutions   
Published: 2024 10 14 11:02:43
Received: 2024 10 15 10:20:38
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Introduction to logging for security purposes - published over 1 year ago.
Content:
https://www.ncsc.gov.uk/guidance/introduction-logging-security-purposes   
Published: 2026 06 23 13:51:03
Received: 2024 10 15 10:20:38
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Introduction to logging for security purposes - published over 1 year ago.
Content:
https://www.ncsc.gov.uk/guidance/introduction-logging-security-purposes   
Published: 2026 06 23 13:51:03
Received: 2024 10 15 10:20:38
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Secure home working on personal IT - published over 3 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/secure-home-working-personal-it   
Published: 2028 07 15 16:55:47
Received: 2024 10 15 10:20:38
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Secure home working on personal IT - published over 3 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/secure-home-working-personal-it   
Published: 2028 07 15 16:55:47
Received: 2024 10 15 10:20:38
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Spotlight on shadow IT - published over 56 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/spotlight-on-shadow-it   
Published: 2081 06 27 07:28:37
Received: 2024 10 15 10:20:38
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Spotlight on shadow IT - published over 56 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/spotlight-on-shadow-it   
Published: 2081 06 27 07:28:37
Received: 2024 10 15 10:20:38
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Serving up some server advice - published over 164 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/serving-up-some-server-advice   
Published: 2189 05 20 20:01:12
Received: 2024 10 15 10:20:37
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Serving up some server advice - published over 164 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/serving-up-some-server-advice   
Published: 2189 05 20 20:01:12
Received: 2024 10 15 10:20:37
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: The Cyber Assessment Framework 3.1 - published over 397 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/the-cyber-assessment-framework-3-1   
Published: 2422 06 11 15:08:05
Received: 2024 10 15 10:20:37
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: The Cyber Assessment Framework 3.1 - published over 397 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/the-cyber-assessment-framework-3-1   
Published: 2422 06 11 15:08:05
Received: 2024 10 15 10:20:37
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: A different future for telecoms in the UK - published over 2116 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/a-different-future-for-telecoms-in-the-uk   
Published: 4141 07 05 19:41:04
Received: 2024 10 15 10:20:37
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: A different future for telecoms in the UK - published over 2116 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/a-different-future-for-telecoms-in-the-uk   
Published: 4141 07 05 19:41:04
Received: 2024 10 15 10:20:37
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Marketplace Benchmark
Cyber Tzar Marketplace Benchmark
Article: Relaunching the NCSC's Cloud security guidance collection - published over 18180 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/relaunching-the-ncscs-cloud-security-guidance-collection   
Published: 20205 05 12 09:34:01
Received: 2024 10 15 10:20:37
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Relaunching the NCSC's Cloud security guidance collection - published over 18180 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/relaunching-the-ncscs-cloud-security-guidance-collection   
Published: 20205 05 12 09:34:01
Received: 2024 10 15 10:20:37
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Benchmark Summary
Cyber Tzar Benchmark Summary
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: 'PDNS for Schools' to provide cyber resilience for more institutions - published 1 day ago.
Content:
https://www.ncsc.gov.uk/blog-post/pdns-for-schools-provide-cyber-resilience-for-more-institutions   
Published: 2024 10 14 11:02:43
Received: 2024 10 15 10:20:14
Feed: NCSC – Blog Feed
Source: National Cyber Security Centre (NCSC)
Category: Blogs
Topic: Cyber Security
Article: 'PDNS for Schools' to provide cyber resilience for more institutions - published 1 day ago.
Content:
https://www.ncsc.gov.uk/blog-post/pdns-for-schools-provide-cyber-resilience-for-more-institutions   
Published: 2024 10 14 11:02:43
Received: 2024 10 15 10:20:14
Feed: NCSC – Blog Feed
Source: National Cyber Security Centre (NCSC)
Category: Blogs
Topic: Cyber Security
Article: Five Challenges of National Information Assurance and How to Overcome Them - published about 4 hours ago.
Content:
https://www.tripwire.com/state-of-security/challenges-national-information-assurance-and-how-overcome-them   
Published: 2024 10 15 08:03:15
Received: 2024 10 15 09:59:13
Feed: The State of Security
Source: The State of Security
Category: Cyber Security
Topic: Cyber Security
Article: Five Challenges of National Information Assurance and How to Overcome Them - published about 4 hours ago.
Content:
https://www.tripwire.com/state-of-security/challenges-national-information-assurance-and-how-overcome-them   
Published: 2024 10 15 08:03:15
Received: 2024 10 15 09:59:13
Feed: The State of Security
Source: The State of Security
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Change Over Time (Basic)
Cyber Tzar Change Over Time (Basic)
Article: Australia Considers Mandatory Reporting of Ransom Payments - published about 4 hours ago.
Content:
https://www.tripwire.com/state-of-security/australia-considers-mandatory-reporting-ransom-payments   
Published: 2024 10 15 08:03:19
Received: 2024 10 15 09:59:13
Feed: The State of Security
Source: The State of Security
Category: Cyber Security
Topic: Cyber Security
Article: Australia Considers Mandatory Reporting of Ransom Payments - published about 4 hours ago.
Content:
https://www.tripwire.com/state-of-security/australia-considers-mandatory-reporting-ransom-payments   
Published: 2024 10 15 08:03:19
Received: 2024 10 15 09:59:13
Feed: The State of Security
Source: The State of Security
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: China again claims Volt Typhoon cyber-attack crew was invented by the US to discredit it - published about 11 hours ago.
Content:
https://go.theregister.com/feed/www.theregister.com/2024/10/15/china_volt_typhoon_false_flag/   
Published: 2024 10 15 01:15:08
Received: 2024 10 15 09:41:26
Feed: The Register - Security
Source: The Register
Category: News
Topic: Cyber Security
Article: China again claims Volt Typhoon cyber-attack crew was invented by the US to discredit it - published about 11 hours ago.
Content:
https://go.theregister.com/feed/www.theregister.com/2024/10/15/china_volt_typhoon_false_flag/   
Published: 2024 10 15 01:15:08
Received: 2024 10 15 09:41:26
Feed: The Register - Security
Source: The Register
Category: News
Topic: Cyber Security
Article: Experts Call for Urgent Cybersecurity Regulations | News | liberianobserver.com - published about 8 hours ago.
Content: This urgent appeal comes in the wake of a three-day cybersecurity awareness conference organized by the Liberia Telecommunications Authority (LTA), ...
https://www.liberianobserver.com/news/experts-call-for-urgent-cybersecurity-regulations/article_a916440c-8aab-11ef-b711-4bac05b1c77f.html   
Published: 2024 10 15 04:28:29
Received: 2024 10 15 09:41:17
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Experts Call for Urgent Cybersecurity Regulations | News | liberianobserver.com - published about 8 hours ago.
Content: This urgent appeal comes in the wake of a three-day cybersecurity awareness conference organized by the Liberia Telecommunications Authority (LTA), ...
https://www.liberianobserver.com/news/experts-call-for-urgent-cybersecurity-regulations/article_a916440c-8aab-11ef-b711-4bac05b1c77f.html   
Published: 2024 10 15 04:28:29
Received: 2024 10 15 09:41:17
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Port Vulnerability Scan Report
Article: Cyber wars and global collaboration: Huawei executive on cybersecurity - CGTN - published about 7 hours ago.
Content: "Cybersecurity is no longer a weapon of mass disruption but of mass destruction, because it can kill lives," said Aloysius Cheang, ...
https://news.cgtn.com/news/2024-10-14/Cyber-wars-and-global-collaboration-Huawei-executive-on-cybersecurity-1xH2RhrWO52/p.html   
Published: 2024 10 15 05:41:05
Received: 2024 10 15 09:41:17
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Cyber wars and global collaboration: Huawei executive on cybersecurity - CGTN - published about 7 hours ago.
Content: "Cybersecurity is no longer a weapon of mass disruption but of mass destruction, because it can kill lives," said Aloysius Cheang, ...
https://news.cgtn.com/news/2024-10-14/Cyber-wars-and-global-collaboration-Huawei-executive-on-cybersecurity-1xH2RhrWO52/p.html   
Published: 2024 10 15 05:41:05
Received: 2024 10 15 09:41:17
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Re-Score Report
Cyber Tzar Re-Score Report
Article: China again claims Volt Typhoon cyber-attack crew was invented by the US to discredit it - published about 11 hours ago.
Content:
https://go.theregister.com/feed/www.theregister.com/2024/10/15/china_volt_typhoon_false_flag/   
Published: 2024 10 15 01:15:08
Received: 2024 10 15 09:40:43
Feed: The Register - Security
Source: The Register - Security
Category: Cyber Security
Topic: Cyber Security
Article: China again claims Volt Typhoon cyber-attack crew was invented by the US to discredit it - published about 11 hours ago.
Content:
https://go.theregister.com/feed/www.theregister.com/2024/10/15/china_volt_typhoon_false_flag/   
Published: 2024 10 15 01:15:08
Received: 2024 10 15 09:40:43
Feed: The Register - Security
Source: The Register - Security
Category: Cyber Security
Topic: Cyber Security
Article: Senior Google Cloud Platform Security Engineer - Cloudpaths - Remote or Minneapolis, MN - published about 8 hours ago.
Content: 10-14-2024 - Automation & IaC: Proficiency with Infrastructure as Code tools (Terraform) and cloud security automation. DevSecOps Expertise: Str..
https://www.dice.com/job-detail/853a068e-b900-4f6c-bd60-eb2587d0799f   
Published: 2024 10 15 04:10:51
Received: 2024 10 15 09:22:55
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: Senior Google Cloud Platform Security Engineer - Cloudpaths - Remote or Minneapolis, MN - published about 8 hours ago.
Content: 10-14-2024 - Automation & IaC: Proficiency with Infrastructure as Code tools (Terraform) and cloud security automation. DevSecOps Expertise: Str..
https://www.dice.com/job-detail/853a068e-b900-4f6c-bd60-eb2587d0799f   
Published: 2024 10 15 04:10:51
Received: 2024 10 15 09:22:55
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Port Vulnerability Scan Report
Article: Mul-T-Lock teams up with Charnwood Lock and Key - published about 3 hours ago.
Content: Mul-T-Lock has teamed up with Charnwood Lock and Key to provide master key systems for Loc8me, a student accommodation management agency. Since its establishment in 2008, Loc8me has grown to have over 6,000 tenants and manage over 2,500 properties across Loughborough, Bristol, Durham, Newcastle, Nottingham, Leeds, Manchester, Hull, Leicester, Liverpool ...
https://securityjournaluk.com/mul-t-lock-teams-up-charnwood-lock-and-key/   
Published: 2024 10 15 08:58:05
Received: 2024 10 15 09:03:19
Feed: Security Journal UK
Source: Security Journal UK
Category: Security
Topic: Security
Article: Mul-T-Lock teams up with Charnwood Lock and Key - published about 3 hours ago.
Content: Mul-T-Lock has teamed up with Charnwood Lock and Key to provide master key systems for Loc8me, a student accommodation management agency. Since its establishment in 2008, Loc8me has grown to have over 6,000 tenants and manage over 2,500 properties across Loughborough, Bristol, Durham, Newcastle, Nottingham, Leeds, Manchester, Hull, Leicester, Liverpool ...
https://securityjournaluk.com/mul-t-lock-teams-up-charnwood-lock-and-key/   
Published: 2024 10 15 08:58:05
Received: 2024 10 15 09:03:19
Feed: Security Journal UK
Source: Security Journal UK
Category: Security
Topic: Security
Cyber Tzar SSL Certificate Health Check
Cyber Tzar SSL Certificate Health Check
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: China Accuses U.S. of Fabricating Volt Typhoon to Hide Its Own Hacking Campaigns - published about 4 hours ago.
Content:
https://thehackernews.com/2024/10/china-accuses-us-of-fabricating-volt.html   
Published: 2024 10 15 08:03:00
Received: 2024 10 15 09:01:50
Feed: The Hacker News
Source: The Hacker News
Category: News
Topic: Cyber Security
Article: China Accuses U.S. of Fabricating Volt Typhoon to Hide Its Own Hacking Campaigns - published about 4 hours ago.
Content:
https://thehackernews.com/2024/10/china-accuses-us-of-fabricating-volt.html   
Published: 2024 10 15 08:03:00
Received: 2024 10 15 09:01:50
Feed: The Hacker News
Source: The Hacker News
Category: News
Topic: Cyber Security
Article: At the forefront of employee safety   - published about 5 hours ago.
Content: In an upcoming webinar, Peoplesafe are exploring the complexities security professionals face to ensure employee safety in a hybrid work model. Can you explain more about Peoplesafe and the company’s core values?   Peoplesafe is the largest provider of employee safety technology in the world. Our 24/7 service protects a company’s most valuable assets...
https://securityjournaluk.com/at-the-forefront-of-employee-safety/   
Published: 2024 10 15 07:30:00
Received: 2024 10 15 08:43:24
Feed: Security Journal UK
Source: Security Journal UK
Category: Security
Topic: Security
Article: At the forefront of employee safety   - published about 5 hours ago.
Content: In an upcoming webinar, Peoplesafe are exploring the complexities security professionals face to ensure employee safety in a hybrid work model. Can you explain more about Peoplesafe and the company’s core values?   Peoplesafe is the largest provider of employee safety technology in the world. Our 24/7 service protects a company’s most valuable assets...
https://securityjournaluk.com/at-the-forefront-of-employee-safety/   
Published: 2024 10 15 07:30:00
Received: 2024 10 15 08:43:24
Feed: Security Journal UK
Source: Security Journal UK
Category: Security
Topic: Security
Cyber Tzar SSL Certificate Health Check
Cyber Tzar SSL Certificate Health Check
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Speakers, vacuums, doorbells and fridges – the government plans to make your 'smart ... - published about 9 hours ago.
Content: The new cyber security act provides for “mandatory security standards” for smart devices. It establishes the legal framework for enforcing these ...
https://theconversation.com/speakers-vacuums-doorbells-and-fridges-the-government-plans-to-make-your-smart-things-more-secure-241057   
Published: 2024 10 15 02:56:26
Received: 2024 10 15 08:41:22
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Speakers, vacuums, doorbells and fridges – the government plans to make your 'smart ... - published about 9 hours ago.
Content: The new cyber security act provides for “mandatory security standards” for smart devices. It establishes the legal framework for enforcing these ...
https://theconversation.com/speakers-vacuums-doorbells-and-fridges-the-government-plans-to-make-your-smart-things-more-secure-241057   
Published: 2024 10 15 02:56:26
Received: 2024 10 15 08:41:22
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Cyber Security and Resilience Bill: Government confirms introduction to Parliament next year - published about 9 hours ago.
Content: The Government has confirmed that a new Cyber Security and Resilience Bill will be introduced to Parliament next year. The Bill, announced in the…
https://www.lexology.com/library/detail.aspx?g=90fb2b13-5ee7-4088-ab1c-b29b57a12e73   
Published: 2024 10 15 03:41:38
Received: 2024 10 15 08:41:22
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Cyber Security and Resilience Bill: Government confirms introduction to Parliament next year - published about 9 hours ago.
Content: The Government has confirmed that a new Cyber Security and Resilience Bill will be introduced to Parliament next year. The Bill, announced in the…
https://www.lexology.com/library/detail.aspx?g=90fb2b13-5ee7-4088-ab1c-b29b57a12e73   
Published: 2024 10 15 03:41:38
Received: 2024 10 15 08:41:22
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Cyber Tzar SSL Certificate Health Check
Cyber Tzar SSL Certificate Health Check
Article: Malaysia ramps up cyber security defense to stem rising fraud and ransomware attacks - published about 7 hours ago.
Content: Dr Wahab: In Malaysia, particularly through Cyber Security Malaysia's Cyber 999 Help Centre, we've recorded 4,174 incidents as of August 2024. Fraud ...
https://www.itnews.asia/news/malaysia-ramps-up-cyber-security-defense-to-stem-rising-fraud-and-ransomware-attacks-612379   
Published: 2024 10 15 05:21:51
Received: 2024 10 15 08:41:22
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Malaysia ramps up cyber security defense to stem rising fraud and ransomware attacks - published about 7 hours ago.
Content: Dr Wahab: In Malaysia, particularly through Cyber Security Malaysia's Cyber 999 Help Centre, we've recorded 4,174 incidents as of August 2024. Fraud ...
https://www.itnews.asia/news/malaysia-ramps-up-cyber-security-defense-to-stem-rising-fraud-and-ransomware-attacks-612379   
Published: 2024 10 15 05:21:51
Received: 2024 10 15 08:41:22
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Cyber Tzar SSL Certificate Health Check
Cyber Tzar SSL Certificate Health Check
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: New research links online piracy with increased cyber risk - published about 7 hours ago.
Content: ... cyber security concerns. According to the report, there is a definite correlation between pirating media and cyber security risk, with a third of ...
https://www.cybersecurityconnect.com.au/culture/11242-new-research-links-online-piracy-with-increased-cyber-risk   
Published: 2024 10 15 05:35:53
Received: 2024 10 15 08:41:22
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Article: New research links online piracy with increased cyber risk - published about 7 hours ago.
Content: ... cyber security concerns. According to the report, there is a definite correlation between pirating media and cyber security risk, with a third of ...
https://www.cybersecurityconnect.com.au/culture/11242-new-research-links-online-piracy-with-increased-cyber-risk   
Published: 2024 10 15 05:35:53
Received: 2024 10 15 08:41:22
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Cyber platform protecting SMEs raises further £500k - Business Cloud - published about 5 hours ago.
Content: The company now serves over 60 clients including Virgin Wines, Crafters Companion and Jules B. How to secure your business before new Cyber Security ...
https://businesscloud.co.uk/news/cyber-platform-protecting-smes-raises-further-500k/   
Published: 2024 10 15 07:04:05
Received: 2024 10 15 08:41:22
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Cyber platform protecting SMEs raises further £500k - Business Cloud - published about 5 hours ago.
Content: The company now serves over 60 clients including Virgin Wines, Crafters Companion and Jules B. How to secure your business before new Cyber Security ...
https://businesscloud.co.uk/news/cyber-platform-protecting-smes-raises-further-500k/   
Published: 2024 10 15 07:04:05
Received: 2024 10 15 08:41:22
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Article: China again claims Volt Typhoon was invented by the US - The Register - published about 5 hours ago.
Content: ... cyber security experts contact it to share their belief that US authorities and Microsoft lacked evidence to associate Volt Typhoon with China.
https://www.theregister.com/2024/10/15/china_volt_typhoon_false_flag/   
Published: 2024 10 15 07:17:00
Received: 2024 10 15 08:41:22
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Article: China again claims Volt Typhoon was invented by the US - The Register - published about 5 hours ago.
Content: ... cyber security experts contact it to share their belief that US authorities and Microsoft lacked evidence to associate Volt Typhoon with China.
https://www.theregister.com/2024/10/15/china_volt_typhoon_false_flag/   
Published: 2024 10 15 07:17:00
Received: 2024 10 15 08:41:22
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Cyber Tzar Score Summary
Cyber Tzar Score Summary
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Gitex 2024: AI not magic bullet for cyber security, says Palo Alto Networks | The National - published about 4 hours ago.
Content: Mr Aydin's warning follows a new study from the California-based cyber security company which showed that 97.6 per cent of chief executives and top- ...
https://www.thenationalnews.com/business/2024/10/15/gitex/   
Published: 2024 10 15 07:49:42
Received: 2024 10 15 08:41:22
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Gitex 2024: AI not magic bullet for cyber security, says Palo Alto Networks | The National - published about 4 hours ago.
Content: Mr Aydin's warning follows a new study from the California-based cyber security company which showed that 97.6 per cent of chief executives and top- ...
https://www.thenationalnews.com/business/2024/10/15/gitex/   
Published: 2024 10 15 07:49:42
Received: 2024 10 15 08:41:22
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Governments fear election interference, but it's an enterprise cybersecurity problem too - published about 6 hours ago.
Content: Those in the cybersecurity trenches are beset with adversaries attempting to exploit any existing gaps in defenses, be they within enterprises ...
https://www.csoonline.com/article/3560497/governments-fear-election-interference-but-its-an-enterprise-cybersecurity-problem-too.html   
Published: 2024 10 15 06:16:07
Received: 2024 10 15 08:41:19
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Governments fear election interference, but it's an enterprise cybersecurity problem too - published about 6 hours ago.
Content: Those in the cybersecurity trenches are beset with adversaries attempting to exploit any existing gaps in defenses, be they within enterprises ...
https://www.csoonline.com/article/3560497/governments-fear-election-interference-but-its-an-enterprise-cybersecurity-problem-too.html   
Published: 2024 10 15 06:16:07
Received: 2024 10 15 08:41:19
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: Whalebone Wins 2024 CyberSecurity Breakthrough Award - published about 4 hours ago.
Content: Whalebone Wins 2024 CyberSecurity Breakthrough Award. Named “Web Filtering & Control Solution of the Year,” Whalebone's DNS security is recognized for ...
https://www.cybersecuritydive.com/press-release/20241014-whalebone-wins-2024-cybersecurity-breakthrough-award/   
Published: 2024 10 15 08:08:58
Received: 2024 10 15 08:41:18
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Whalebone Wins 2024 CyberSecurity Breakthrough Award - published about 4 hours ago.
Content: Whalebone Wins 2024 CyberSecurity Breakthrough Award. Named “Web Filtering & Control Solution of the Year,” Whalebone's DNS security is recognized for ...
https://www.cybersecuritydive.com/press-release/20241014-whalebone-wins-2024-cybersecurity-breakthrough-award/   
Published: 2024 10 15 08:08:58
Received: 2024 10 15 08:41:18
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Health Sector Cybersecurity Coordination Center recommends that providers appoint CISO - published about 4 hours ago.
Content: The Health Sector Cybersecurity Coordination Center (HC3) has warned healthcare providers about Trinity Ransomware group and its focus on ...
https://htn.co.uk/2024/10/15/health-sector-cybersecurity-coordination-center-recommends-that-providers-appoint-chief-information-security-officer/   
Published: 2024 10 15 08:11:59
Received: 2024 10 15 08:41:18
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Health Sector Cybersecurity Coordination Center recommends that providers appoint CISO - published about 4 hours ago.
Content: The Health Sector Cybersecurity Coordination Center (HC3) has warned healthcare providers about Trinity Ransomware group and its focus on ...
https://htn.co.uk/2024/10/15/health-sector-cybersecurity-coordination-center-recommends-that-providers-appoint-chief-information-security-officer/   
Published: 2024 10 15 08:11:59
Received: 2024 10 15 08:41:18
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Are Password Managers Safe to Use? (Benefits, Risks & Best Practices) - published about 5 hours ago.
Content:
https://www.techrepublic.com/article/are-password-managers-safe/   
Published: 2024 10 15 07:00:22
Received: 2024 10 15 08:20:45
Feed: IT Security Blog | TechRepublic
Source: IT Security Blog | TechRepublic
Category: Cyber Security
Topic: Cyber Security
Article: Are Password Managers Safe to Use? (Benefits, Risks & Best Practices) - published about 5 hours ago.
Content:
https://www.techrepublic.com/article/are-password-managers-safe/   
Published: 2024 10 15 07:00:22
Received: 2024 10 15 08:20:45
Feed: IT Security Blog | TechRepublic
Source: IT Security Blog | TechRepublic
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Score Analysis
Cyber Tzar Score Analysis
Article: Netwrix appoints Grady Summers as CEO - published about 5 hours ago.
Content:
https://www.helpnetsecurity.com/2024/10/15/netwrix-grady-summers/   
Published: 2024 10 15 07:30:11
Received: 2024 10 15 08:18:47
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Article: Netwrix appoints Grady Summers as CEO - published about 5 hours ago.
Content:
https://www.helpnetsecurity.com/2024/10/15/netwrix-grady-summers/   
Published: 2024 10 15 07:30:11
Received: 2024 10 15 08:18:47
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Risk Impact Distribution
Cyber Tzar Risk Impact Distribution
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Calix enhances SmartHome to improve protection for residential subscribers - published about 5 hours ago.
Content:
https://www.helpnetsecurity.com/2024/10/15/calix-smarthome/   
Published: 2024 10 15 07:45:15
Received: 2024 10 15 08:18:47
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Article: Calix enhances SmartHome to improve protection for residential subscribers - published about 5 hours ago.
Content:
https://www.helpnetsecurity.com/2024/10/15/calix-smarthome/   
Published: 2024 10 15 07:45:15
Received: 2024 10 15 08:18:47
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Article: Defending software build pipelines from malicious attack - published over 2023 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/defending-software-build-pipelines-from-malicious-attack   
Published: 0001 02 03 10:56:27
Received: 2024 10 15 08:01:15
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Defending software build pipelines from malicious attack - published over 2023 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/defending-software-build-pipelines-from-malicious-attack   
Published: 0001 02 03 10:56:27
Received: 2024 10 15 08:01:15
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Risk Impact Assesment
Cyber Tzar Risk Impact Assesment
Article: Equities process - published over 2015 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/equities-process   
Published: 0009 07 12 08:07:26
Received: 2024 10 15 08:01:15
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Equities process - published over 2015 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/equities-process   
Published: 0009 07 12 08:07:26
Received: 2024 10 15 08:01:15
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Introducing the guidelines for secure AI - published over 1988 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/introducing-guidelines-secure-ai-system-development   
Published: 0036 02 12 11:49:11
Received: 2024 10 15 08:01:15
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Introducing the guidelines for secure AI - published over 1988 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/introducing-guidelines-secure-ai-system-development   
Published: 0036 02 12 11:49:11
Received: 2024 10 15 08:01:15
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Studies in secure system design - published over 1822 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/studies-in-secure-system-design   
Published: 0202 05 22 14:53:12
Received: 2024 10 15 08:01:15
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Studies in secure system design - published over 1822 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/studies-in-secure-system-design   
Published: 0202 05 22 14:53:12
Received: 2024 10 15 08:01:15
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Risk Groups Explained
Cyber Tzar Risk Groups Explained
Article: Moving to a cloud, not a storm - published almost 4 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/move-to-a-cloud-not-a-storm   
Published: 2020 10 21 14:18:15
Received: 2024 10 15 08:01:08
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Moving to a cloud, not a storm - published almost 4 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/move-to-a-cloud-not-a-storm   
Published: 2020 10 21 14:18:15
Received: 2024 10 15 08:01:08
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: The elephant in the data centre - published almost 4 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/the-elephant-in-the-data-centre   
Published: 2020 11 13 02:20:17
Received: 2024 10 15 08:01:08
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: The elephant in the data centre - published almost 4 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/the-elephant-in-the-data-centre   
Published: 2020 11 13 02:20:17
Received: 2024 10 15 08:01:08
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: NCSC for Startups: an ecosystem-based approach to cyber security - published over 1 year ago.
Content:
https://www.ncsc.gov.uk/blog-post/ncsc-for-startups-an-ecosystem-based-approach-to-cyber-security   
Published: 2023 01 26 09:02:16
Received: 2024 10 15 08:00:52
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: NCSC for Startups: an ecosystem-based approach to cyber security - published over 1 year ago.
Content:
https://www.ncsc.gov.uk/blog-post/ncsc-for-startups-an-ecosystem-based-approach-to-cyber-security   
Published: 2023 01 26 09:02:16
Received: 2024 10 15 08:00:52
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Logging Made Easy with CISA - published 12 months ago.
Content:
https://www.ncsc.gov.uk/blog-post/logging-made-easy-with-cisa   
Published: 2023 10 27 15:21:39
Received: 2024 10 15 08:00:46
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Logging Made Easy with CISA - published 12 months ago.
Content:
https://www.ncsc.gov.uk/blog-post/logging-made-easy-with-cisa   
Published: 2023 10 27 15:21:39
Received: 2024 10 15 08:00:46
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Migrating to post-quantum cryptography - published 11 months ago.
Content:
https://www.ncsc.gov.uk/blog-post/migrating-to-post-quantum-cryptography-pqc   
Published: 2023 11 06 08:35:07
Received: 2024 10 15 08:00:46
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Migrating to post-quantum cryptography - published 11 months ago.
Content:
https://www.ncsc.gov.uk/blog-post/migrating-to-post-quantum-cryptography-pqc   
Published: 2023 11 06 08:35:07
Received: 2024 10 15 08:00:46
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Check your email security, and protect your customers - published 7 months ago.
Content:
https://www.ncsc.gov.uk/blog-post/cyes-protect-customers   
Published: 2024 03 12 02:31:41
Received: 2024 10 15 08:00:43
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Check your email security, and protect your customers - published 7 months ago.
Content:
https://www.ncsc.gov.uk/blog-post/cyes-protect-customers   
Published: 2024 03 12 02:31:41
Received: 2024 10 15 08:00:43
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: NCSC's cyber security training for staff now available - published 6 months ago.
Content:
https://www.ncsc.gov.uk/blog-post/ncsc-cyber-security-training-for-staff-now-available   
Published: 2024 05 02 13:12:09
Received: 2024 10 15 08:00:41
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: NCSC's cyber security training for staff now available - published 6 months ago.
Content:
https://www.ncsc.gov.uk/blog-post/ncsc-cyber-security-training-for-staff-now-available   
Published: 2024 05 02 13:12:09
Received: 2024 10 15 08:00:41
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Cyber Assessment Framework 3.2 - published 5 months ago.
Content:
https://www.ncsc.gov.uk/blog-post/cyber-assessment-framework-3-2   
Published: 2024 05 08 12:35:20
Received: 2024 10 15 08:00:41
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Cyber Assessment Framework 3.2 - published 5 months ago.
Content:
https://www.ncsc.gov.uk/blog-post/cyber-assessment-framework-3-2   
Published: 2024 05 08 12:35:20
Received: 2024 10 15 08:00:41
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: A different future for telecoms in the UK - published 5 months ago.
Content:
https://www.ncsc.gov.uk/blog-post/a-different-future-for-telecoms-in-the-uk   
Published: 2024 05 09 12:33:28
Received: 2024 10 15 08:00:40
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: A different future for telecoms in the UK - published 5 months ago.
Content:
https://www.ncsc.gov.uk/blog-post/a-different-future-for-telecoms-in-the-uk   
Published: 2024 05 09 12:33:28
Received: 2024 10 15 08:00:40
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Ransomware and the cyber crime ecosystem - published 5 months ago.
Content:
https://www.ncsc.gov.uk/blog-post/ransomware-cyber-crime-ecosystem   
Published: 2024 05 29 08:37:07
Received: 2024 10 15 08:00:40
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Ransomware and the cyber crime ecosystem - published 5 months ago.
Content:
https://www.ncsc.gov.uk/blog-post/ransomware-cyber-crime-ecosystem   
Published: 2024 05 29 08:37:07
Received: 2024 10 15 08:00:40
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Re-Score Report
Cyber Tzar Re-Score Report
Cyber Tzar Marketplace Benchmark
Cyber Tzar Marketplace Benchmark
Article: Researchers Uncover Hijack Loader Malware Using Stolen Code-Signing Certificates - published about 6 hours ago.
Content:
https://thehackernews.com/2024/10/researchers-uncover-hijack-loader.html   
Published: 2024 10 15 06:43:00
Received: 2024 10 15 07:59:10
Feed: The Hacker News [ THN ] - Best Security Blog
Source: The Hacker News [ THN ] - Best Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Researchers Uncover Hijack Loader Malware Using Stolen Code-Signing Certificates - published about 6 hours ago.
Content:
https://thehackernews.com/2024/10/researchers-uncover-hijack-loader.html   
Published: 2024 10 15 06:43:00
Received: 2024 10 15 07:59:10
Feed: The Hacker News [ THN ] - Best Security Blog
Source: The Hacker News [ THN ] - Best Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: How we can help younger Australians tackle cybersecurity challenges - published about 12 hours ago.
Content: This October marks Cybersecurity Awareness Month, highlighting younger Australians' struggles with online safety amid rising frustration and ...
https://channellife.com.au/story/how-we-can-help-younger-australians-tackle-cybersecurity-challenges   
Published: 2024 10 15 00:15:14
Received: 2024 10 15 07:41:22
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: How we can help younger Australians tackle cybersecurity challenges - published about 12 hours ago.
Content: This October marks Cybersecurity Awareness Month, highlighting younger Australians' struggles with online safety amid rising frustration and ...
https://channellife.com.au/story/how-we-can-help-younger-australians-tackle-cybersecurity-challenges   
Published: 2024 10 15 00:15:14
Received: 2024 10 15 07:41:22
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Benchmark Summary
Cyber Tzar Benchmark Summary
Article: BlackFog wins AI-based cybersecurity innovation award - SecurityBrief New Zealand - published about 8 hours ago.
Content: BlackFog has been honoured with the title of 'AI-based Cybersecurity Innovation of the Year' at the 2024 CyberSecurity Breakthrough Awards for its ...
https://securitybrief.co.nz/story/blackfog-wins-ai-based-cybersecurity-innovation-award   
Published: 2024 10 15 04:22:55
Received: 2024 10 15 07:41:21
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: BlackFog wins AI-based cybersecurity innovation award - SecurityBrief New Zealand - published about 8 hours ago.
Content: BlackFog has been honoured with the title of 'AI-based Cybersecurity Innovation of the Year' at the 2024 CyberSecurity Breakthrough Awards for its ...
https://securitybrief.co.nz/story/blackfog-wins-ai-based-cybersecurity-innovation-award   
Published: 2024 10 15 04:22:55
Received: 2024 10 15 07:41:21
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Cybersecurity expert explains AI-powered phishing and deep-fake threats - YouTube - published about 5 hours ago.
Content: Michael Rogers, former director at National Security Agency and Team8 operating partner, speaks on what's being done to defend against AI-powered ...
https://www.youtube.com/watch?v=Lh0dGhUL9oY   
Published: 2024 10 15 07:36:36
Received: 2024 10 15 07:41:21
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Cybersecurity expert explains AI-powered phishing and deep-fake threats - YouTube - published about 5 hours ago.
Content: Michael Rogers, former director at National Security Agency and Team8 operating partner, speaks on what's being done to defend against AI-powered ...
https://www.youtube.com/watch?v=Lh0dGhUL9oY   
Published: 2024 10 15 07:36:36
Received: 2024 10 15 07:41:21
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Australian Digital Health Agency to develop new cyber strategy and roadmap - iTnews - published about 9 hours ago.
Content: ... DevSecOps and better “defining” its own role. The strategy's development will be spearheaded by Danielle Pentony, who has been CISO since May 2024 ...
https://www.itnews.com.au/news/australian-digital-health-agency-to-develop-new-cyber-strategy-and-roadmap-612368   
Published: 2024 10 15 02:52:19
Received: 2024 10 15 07:03:20
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: Australian Digital Health Agency to develop new cyber strategy and roadmap - iTnews - published about 9 hours ago.
Content: ... DevSecOps and better “defining” its own role. The strategy's development will be spearheaded by Danielle Pentony, who has been CISO since May 2024 ...
https://www.itnews.com.au/news/australian-digital-health-agency-to-develop-new-cyber-strategy-and-roadmap-612368   
Published: 2024 10 15 02:52:19
Received: 2024 10 15 07:03:20
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Basic)
Cyber Tzar Change Over Time (Basic)
Article: Bryan Richard Yurecka Obituary (2024) - Endicott, NY - Allen Memorial Home - Legacy.com - published about 6 hours ago.
Content: Currently, he was working as a DevSecOps engineer for Mosaic Learning. He had a passion for outdoor activities and moved to North Carolina to ...
https://www.legacy.com/us/obituaries/name/bryan-yurecka-obituary?id=56533988   
Published: 2024 10 15 06:25:45
Received: 2024 10 15 07:03:20
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: Bryan Richard Yurecka Obituary (2024) - Endicott, NY - Allen Memorial Home - Legacy.com - published about 6 hours ago.
Content: Currently, he was working as a DevSecOps engineer for Mosaic Learning. He had a passion for outdoor activities and moved to North Carolina to ...
https://www.legacy.com/us/obituaries/name/bryan-yurecka-obituary?id=56533988   
Published: 2024 10 15 06:25:45
Received: 2024 10 15 07:03:20
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: JFrog与IDC 合作研究显示:开发人员在软件安全方面耗时日益增加,影响企业竞争优势 - 新浪财经 - published about 6 hours ago.
Content: 由 JFrog 赞助的 IDC信息简报《DevSecOps 的隐性成本:开发人员的时间评估 》显示,50% 的高级开发人员、团队领导、产品负责人和开发经理每周花费在软件安全相关 ...
https://finance.sina.com.cn/tech/roll/2024-10-15/doc-incsqxrx4606736.shtml   
Published: 2024 10 15 06:27:22
Received: 2024 10 15 07:03:20
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: JFrog与IDC 合作研究显示:开发人员在软件安全方面耗时日益增加,影响企业竞争优势 - 新浪财经 - published about 6 hours ago.
Content: 由 JFrog 赞助的 IDC信息简报《DevSecOps 的隐性成本:开发人员的时间评估 》显示,50% 的高级开发人员、团队领导、产品负责人和开发经理每周花费在软件安全相关 ...
https://finance.sina.com.cn/tech/roll/2024-10-15/doc-incsqxrx4606736.shtml   
Published: 2024 10 15 06:27:22
Received: 2024 10 15 07:03:20
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: The NHI management challenge: When employees leave - published about 7 hours ago.
Content:
https://www.helpnetsecurity.com/2024/10/15/nhi-management-challenge/   
Published: 2024 10 15 05:00:52
Received: 2024 10 15 06:58:53
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Article: The NHI management challenge: When employees leave - published about 7 hours ago.
Content:
https://www.helpnetsecurity.com/2024/10/15/nhi-management-challenge/   
Published: 2024 10 15 05:00:52
Received: 2024 10 15 06:58:53
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Port Vulnerability Scan Report
Article: More on My AI and Democracy Book - published 4 days ago.
Content: In July, I wrote about my new book project on AI and democracy, to be published by MIT Press in fall 2025. My co-author and collaborator Nathan Sanders and I are hard at work writing. At this point, we would like feedback on titles. Here are four possibilities: Rewiring the Republic: How AI Will Transform our Politics, Government, and Citizenship The Thinki...
https://www.schneier.com/blog/archives/2024/10/more-on-my-ai-and-democracy-book.html   
Published: 2024 10 11 19:00:27
Received: 2024 10 15 05:59:55
Feed: Schneier on Security
Source: Schneier on Security
Category: Cyber Security
Topic: Cyber Security
Article: More on My AI and Democracy Book - published 4 days ago.
Content: In July, I wrote about my new book project on AI and democracy, to be published by MIT Press in fall 2025. My co-author and collaborator Nathan Sanders and I are hard at work writing. At this point, we would like feedback on titles. Here are four possibilities: Rewiring the Republic: How AI Will Transform our Politics, Government, and Citizenship The Thinki...
https://www.schneier.com/blog/archives/2024/10/more-on-my-ai-and-democracy-book.html   
Published: 2024 10 11 19:00:27
Received: 2024 10 15 05:59:55
Feed: Schneier on Security
Source: Schneier on Security
Category: Cyber Security
Topic: Cyber Security
Article: Mastering the Transition from DevOps to DevSecOps: A Step-by-Step Guide - LinkedIn - published about 11 hours ago.
Content: DevSecOps. While DevOps focuses on speed, automation, and collaboration between development and operations, DevSecOps integrates security practices ...
https://www.linkedin.com/pulse/mastering-transition-from-devops-devsecops-guide-jehanzaib-bhatti-y0efc   
Published: 2024 10 15 01:18:46
Received: 2024 10 15 05:23:04
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: Mastering the Transition from DevOps to DevSecOps: A Step-by-Step Guide - LinkedIn - published about 11 hours ago.
Content: DevSecOps. While DevOps focuses on speed, automation, and collaboration between development and operations, DevSecOps integrates security practices ...
https://www.linkedin.com/pulse/mastering-transition-from-devops-devsecops-guide-jehanzaib-bhatti-y0efc   
Published: 2024 10 15 01:18:46
Received: 2024 10 15 05:23:04
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: WordPress Plugin Jetpack Patches Major Vulnerability Affecting 27 Million Sites - published about 7 hours ago.
Content:
https://thehackernews.com/2024/10/wordpress-plugin-jetpack-patches-major.html   
Published: 2024 10 15 04:56:00
Received: 2024 10 15 05:19:05
Feed: The Hacker News [ THN ] - Best Security Blog
Source: The Hacker News [ THN ] - Best Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: WordPress Plugin Jetpack Patches Major Vulnerability Affecting 27 Million Sites - published about 7 hours ago.
Content:
https://thehackernews.com/2024/10/wordpress-plugin-jetpack-patches-major.html   
Published: 2024 10 15 04:56:00
Received: 2024 10 15 05:19:05
Feed: The Hacker News [ THN ] - Best Security Blog
Source: The Hacker News [ THN ] - Best Security Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Port Vulnerability Scan Report
Article: Real-Time Compliance, Real-World Protection: Fortifying Cybersecurity with Qmulos and Splunk - published about 11 hours ago.
Content: ... cybersecurity posture. Hear from security experts at ePlus who will provide an overview of the current cybersecurity challeng...
https://www.scworld.com/cybercast/real-time-compliance-real-world-protection-fortifying-cybersecurity-with-qmulos-and-splunk   
Published: 2024 10 15 01:06:21
Received: 2024 10 15 04:41:47
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Real-Time Compliance, Real-World Protection: Fortifying Cybersecurity with Qmulos and Splunk - published about 11 hours ago.
Content: ... cybersecurity posture. Hear from security experts at ePlus who will provide an overview of the current cybersecurity challeng...
https://www.scworld.com/cybercast/real-time-compliance-real-world-protection-fortifying-cybersecurity-with-qmulos-and-splunk   
Published: 2024 10 15 01:06:21
Received: 2024 10 15 04:41:47
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Cooper cautions North Carolinians about cybersecurity awareness - published about 11 hours ago.
Content: Gov. Roy Cooper declared October Cybersecurity Awareness Month in North Carolina Monday, expressing the importance of online safety and the ...
https://spectrumlocalnews.com/nc/triangle-sandhills/public-safety/2024/10/14/cybersecurity-awareness-month   
Published: 2024 10 15 01:14:39
Received: 2024 10 15 04:41:47
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Cooper cautions North Carolinians about cybersecurity awareness - published about 11 hours ago.
Content: Gov. Roy Cooper declared October Cybersecurity Awareness Month in North Carolina Monday, expressing the importance of online safety and the ...
https://spectrumlocalnews.com/nc/triangle-sandhills/public-safety/2024/10/14/cybersecurity-awareness-month   
Published: 2024 10 15 01:14:39
Received: 2024 10 15 04:41:47
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Port Vulnerability Scan Report
Article: Unlocking cybersecurity secrets with Stephen Viña at NMFTA conference - TheTrucker.com - published about 10 hours ago.
Content: ALEXANDRIA, Va. — Cybersecurity is quickly becoming one of the major issues in the logistics industry and the National Motor Freight Traffic ...
https://www.thetrucker.com/trucking-news/business/unlocking-cybersecurity-secrets-with-stephen-vina-at-nmfta-conference   
Published: 2024 10 15 02:22:32
Received: 2024 10 15 04:41:47
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Unlocking cybersecurity secrets with Stephen Viña at NMFTA conference - TheTrucker.com - published about 10 hours ago.
Content: ALEXANDRIA, Va. — Cybersecurity is quickly becoming one of the major issues in the logistics industry and the National Motor Freight Traffic ...
https://www.thetrucker.com/trucking-news/business/unlocking-cybersecurity-secrets-with-stephen-vina-at-nmfta-conference   
Published: 2024 10 15 02:22:32
Received: 2024 10 15 04:41:47
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Secretary-General of ASEAN to participate in the 9th ASEAN Ministerial Conference on ... - published about 9 hours ago.
Content: Josephine Teo, Minister for Digital Development and Information, and Minister-in-Charge of Smart Nation and Cybersecurity of Singapore, Secretary- ...
https://asean.org/secretary-general-of-asean-to-participate-in-the-9th-asean-ministerial-conference-on-cybersecurity-in-singapore/   
Published: 2024 10 15 03:41:47
Received: 2024 10 15 04:41:46
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Secretary-General of ASEAN to participate in the 9th ASEAN Ministerial Conference on ... - published about 9 hours ago.
Content: Josephine Teo, Minister for Digital Development and Information, and Minister-in-Charge of Smart Nation and Cybersecurity of Singapore, Secretary- ...
https://asean.org/secretary-general-of-asean-to-participate-in-the-9th-asean-ministerial-conference-on-cybersecurity-in-singapore/   
Published: 2024 10 15 03:41:47
Received: 2024 10 15 04:41:46
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: ConnectWise and Pax8 Announce Strategic Partnership to Fortify Cybersecurity and Data ... - published about 8 hours ago.
Content: ... cybersecurity partners. Considering the rising number of cybersecurity incidents, it is critical for MSPs to protect their clients' data and ...
https://www.industryanalysts.com/101424-connectwise/   
Published: 2024 10 15 03:54:08
Received: 2024 10 15 04:41:46
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: ConnectWise and Pax8 Announce Strategic Partnership to Fortify Cybersecurity and Data ... - published about 8 hours ago.
Content: ... cybersecurity partners. Considering the rising number of cybersecurity incidents, it is critical for MSPs to protect their clients' data and ...
https://www.industryanalysts.com/101424-connectwise/   
Published: 2024 10 15 03:54:08
Received: 2024 10 15 04:41:46
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Cyber Tzar Marketplace Benchmark
Cyber Tzar Marketplace Benchmark
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Port Vulnerability Scan Report

All Articles

Ordered by Date Received : Year: "2024"
Page: 1 (of 1,542) > >>

Total Articles in this collection: 77,149


  • "All Articles" links back to the front page, effectivly the Planet "Home Page"; shows all articles, with no selections, or groupings.
  • Default date ordering is by "Received Date" (due to not all RSS feeds having a "Published Date").
  • Only Published Date selections use the articles Published Date.
  • The first page always shows fifty items plus from zero to up to a remaining forty-nine items, before they are commited permently to the next page.
  • All subsequent pages show fifty items.
  • Pagination is in reverse ordering (so that pages are permamenent links, aka "permalinks", to their content).
  • "<<" moves you to the first page (aka newest articles)
  • ">>" moves you to the last page (aka oldest articles)
  • "<" moves you to the previous page (aka newer articles)
  • ">" moves you to the next page (aka older articles)
  • Return to the top of this page Go Now

Custom HTML Block

Click to Open Code Editor