All Articles

Ordered by Date Received : Year: "2022" Month: "06" Day: "10"
Page: << < 4 (of 7) > >>

Total Articles in this collection: 377

Navigation Help at the bottom of the page
Article: Joel Thacker named Indiana DHS Executive Director - published over 2 years ago.
Content:
https://www.securitymagazine.com/articles/97799-joel-thacker-named-indiana-dhs-executive-director   
Published: 2022 06 10 13:51:03
Received: 2022 06 10 14:54:11
Feed: Security Magazine – All Feeds
Source: Security Magazine
Category: News
Topic: Security
Article: Joel Thacker named Indiana DHS Executive Director - published over 2 years ago.
Content:
https://www.securitymagazine.com/articles/97799-joel-thacker-named-indiana-dhs-executive-director   
Published: 2022 06 10 13:51:03
Received: 2022 06 10 14:54:11
Feed: Security Magazine – All Feeds
Source: Security Magazine
Category: News
Topic: Security
Article: DHS Intel app to facilitate intelligence sharing with public safety leaders - published over 2 years ago.
Content:
https://www.securitymagazine.com/articles/97798-dhs-intel-app-to-facilitate-intelligence-sharing-with-public-safety-leaders   
Published: 2022 06 10 14:35:20
Received: 2022 06 10 14:54:11
Feed: Security Magazine – All Feeds
Source: Security Magazine
Category: News
Topic: Security
Article: DHS Intel app to facilitate intelligence sharing with public safety leaders - published over 2 years ago.
Content:
https://www.securitymagazine.com/articles/97798-dhs-intel-app-to-facilitate-intelligence-sharing-with-public-safety-leaders   
Published: 2022 06 10 14:35:20
Received: 2022 06 10 14:54:11
Feed: Security Magazine – All Feeds
Source: Security Magazine
Category: News
Topic: Security
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Article: DevSecOps Engineer in Dulles, Virginia | ClearedJobs.Net - published over 2 years ago.
Content: DevSecOps Engineer in Dulles, Virginia | ClearedJobs.Net Overview DevSevOps Engineerwww.woodcons.comSeeking a DevSecOps Engineer to support the ...
https://clearedjobs.net/job/devsecops-engineer-dulles-virginia-1147454   
Published: 2022 06 10 00:09:09
Received: 2022 06 10 14:44:21
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: DevSecOps Engineer in Dulles, Virginia | ClearedJobs.Net - published over 2 years ago.
Content: DevSecOps Engineer in Dulles, Virginia | ClearedJobs.Net Overview DevSevOps Engineerwww.woodcons.comSeeking a DevSecOps Engineer to support the ...
https://clearedjobs.net/job/devsecops-engineer-dulles-virginia-1147454   
Published: 2022 06 10 00:09:09
Received: 2022 06 10 14:44:21
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Cyber Tzar Score Summary
Cyber Tzar Score Summary
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Article: VivSoft Receives $90M HHS Contract To Provide DevSecOps Platform - published over 2 years ago.
Content: The Department of Health and Human Services has awarded data support and solutions provider VivSoft Technologies a prime contract under the ...
https://potomacofficersclub.com/news/vivsoft-receives-90m-hhs-contract-to-provide-devsecops-platform/   
Published: 2022 06 10 13:31:16
Received: 2022 06 10 14:44:21
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: VivSoft Receives $90M HHS Contract To Provide DevSecOps Platform - published over 2 years ago.
Content: The Department of Health and Human Services has awarded data support and solutions provider VivSoft Technologies a prime contract under the ...
https://potomacofficersclub.com/news/vivsoft-receives-90m-hhs-contract-to-provide-devsecops-platform/   
Published: 2022 06 10 13:31:16
Received: 2022 06 10 14:44:21
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: Craig Federighi Talks iOS 16 Lock Screen Redesign, macOS Ventura System Settings, and More at 'The Talk Show Live' - published over 2 years ago.
Content:
https://www.macrumors.com/2022/06/10/craig-federighi-wwdc-2022-talk-show/   
Published: 2022 06 10 14:17:53
Received: 2022 06 10 14:43:26
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Article: Craig Federighi Talks iOS 16 Lock Screen Redesign, macOS Ventura System Settings, and More at 'The Talk Show Live' - published over 2 years ago.
Content:
https://www.macrumors.com/2022/06/10/craig-federighi-wwdc-2022-talk-show/   
Published: 2022 06 10 14:17:53
Received: 2022 06 10 14:43:26
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: New Emotet Variant Stealing Users' Credit Card Information from Google Chrome - published over 2 years ago.
Content:
https://thehackernews.com/2022/06/new-emotet-variant-stealing-users.html   
Published: 2022 06 10 14:39:04
Received: 2022 06 10 14:42:03
Feed: The Hacker News
Source: The Hacker News
Category: News
Topic: Cyber Security
Article: New Emotet Variant Stealing Users' Credit Card Information from Google Chrome - published over 2 years ago.
Content:
https://thehackernews.com/2022/06/new-emotet-variant-stealing-users.html   
Published: 2022 06 10 14:39:04
Received: 2022 06 10 14:42:03
Feed: The Hacker News
Source: The Hacker News
Category: News
Topic: Cyber Security
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Article: Symbiote: A Stealthy Linux Malware Targeting Latin American Financial Sector - published over 2 years ago.
Content:
https://thehackernews.com/2022/06/symbiote-stealthy-linux-malware.html   
Published: 2022 06 10 14:39:24
Received: 2022 06 10 14:42:03
Feed: The Hacker News
Source: The Hacker News
Category: News
Topic: Cyber Security
Article: Symbiote: A Stealthy Linux Malware Targeting Latin American Financial Sector - published over 2 years ago.
Content:
https://thehackernews.com/2022/06/symbiote-stealthy-linux-malware.html   
Published: 2022 06 10 14:39:24
Received: 2022 06 10 14:42:03
Feed: The Hacker News
Source: The Hacker News
Category: News
Topic: Cyber Security
Article: 5 cyber threats facing the education sector - published over 2 years ago.
Content:
https://www.securitymagazine.com/articles/97796-5-cyber-threats-facing-the-education-sector   
Published: 2022 06 10 13:16:34
Received: 2022 06 10 14:41:58
Feed: Security Magazine – News
Source: Security Magazine
Category: News
Topic: Cyber Security
Article: 5 cyber threats facing the education sector - published over 2 years ago.
Content:
https://www.securitymagazine.com/articles/97796-5-cyber-threats-facing-the-education-sector   
Published: 2022 06 10 13:16:34
Received: 2022 06 10 14:41:58
Feed: Security Magazine – News
Source: Security Magazine
Category: News
Topic: Cyber Security
Cyber Tzar Score Analysis
Cyber Tzar Score Analysis
Article: Cybersecurity Mesh Innovator Gradient Technologies Receives - GlobeNewswire - published over 2 years ago.
Content: Cybersecurity Mesh Innovator Gradient Technologies Receives Coveted 2022 MassVentures START Award. Gradient recognized as one of the top ten most ...
https://www.globenewswire.com/news-release/2022/06/09/2460128/0/en/Cybersecurity-Mesh-Innovator-Gradient-Technologies-Receives-Coveted-2022-MassVentures-START-Award.html   
Published: 2022 06 10 08:11:25
Received: 2022 06 10 14:41:49
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Cybersecurity Mesh Innovator Gradient Technologies Receives - GlobeNewswire - published over 2 years ago.
Content: Cybersecurity Mesh Innovator Gradient Technologies Receives Coveted 2022 MassVentures START Award. Gradient recognized as one of the top ten most ...
https://www.globenewswire.com/news-release/2022/06/09/2460128/0/en/Cybersecurity-Mesh-Innovator-Gradient-Technologies-Receives-Coveted-2022-MassVentures-START-Award.html   
Published: 2022 06 10 08:11:25
Received: 2022 06 10 14:41:49
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Cyber Tzar Risk Impact Distribution
Cyber Tzar Risk Impact Distribution
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: Glen Oaks to offer scholarships for students enrolled in cybersecurity programs - Sturgis Journal - published over 2 years ago.
Content: Students who want to study cybersecurity have an opportunity to apply for $1,500 scholarships at Glen Oaks Community College, ...
https://www.sturgisjournal.com/story/news/2022/06/10/news-glen-oaks-community-college-microsoft-corporation-1-500-cybersecurity-scholarships/7569945001/   
Published: 2022 06 10 13:32:16
Received: 2022 06 10 14:41:48
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Glen Oaks to offer scholarships for students enrolled in cybersecurity programs - Sturgis Journal - published over 2 years ago.
Content: Students who want to study cybersecurity have an opportunity to apply for $1,500 scholarships at Glen Oaks Community College, ...
https://www.sturgisjournal.com/story/news/2022/06/10/news-glen-oaks-community-college-microsoft-corporation-1-500-cybersecurity-scholarships/7569945001/   
Published: 2022 06 10 13:32:16
Received: 2022 06 10 14:41:48
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: How much is enough? How to build a targeted and sustainable cybersecurity budget - published over 2 years ago.
Content: Cyber risk optimisation is about understanding threats, priorities and business investments and using these insights to design a cybersecurity ...
https://www.intelligentcio.com/eu/2022/06/10/how-much-is-enough-how-to-build-a-targeted-and-sustainable-cybersecurity-budget/   
Published: 2022 06 10 14:28:54
Received: 2022 06 10 14:41:48
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: How much is enough? How to build a targeted and sustainable cybersecurity budget - published over 2 years ago.
Content: Cyber risk optimisation is about understanding threats, priorities and business investments and using these insights to design a cybersecurity ...
https://www.intelligentcio.com/eu/2022/06/10/how-much-is-enough-how-to-build-a-targeted-and-sustainable-cybersecurity-budget/   
Published: 2022 06 10 14:28:54
Received: 2022 06 10 14:41:48
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Cyber Tzar Risk Impact Assesment
Cyber Tzar Risk Impact Assesment
Article: [Webinar] Privacy and Cybersecurity Contracting: What's the “Deal”? - June 29th, 12:00 pm - published over 2 years ago.
Content: Security Schedules, Privacy Addenda, TOMs, DPAs—whatever you call them, privacy and cybersecurity contract terms have exploded in prevalence in ...
https://www.jdsupra.com/legalnews/webinar-privacy-and-cybersecurity-8621589/   
Published: 2022 06 10 14:29:33
Received: 2022 06 10 14:41:48
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: [Webinar] Privacy and Cybersecurity Contracting: What's the “Deal”? - June 29th, 12:00 pm - published over 2 years ago.
Content: Security Schedules, Privacy Addenda, TOMs, DPAs—whatever you call them, privacy and cybersecurity contract terms have exploded in prevalence in ...
https://www.jdsupra.com/legalnews/webinar-privacy-and-cybersecurity-8621589/   
Published: 2022 06 10 14:29:33
Received: 2022 06 10 14:41:48
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Article: Roblox Game Pass store used to sell ransomware decryptor - published over 2 years ago.
Content:
https://www.bleepingcomputer.com/news/security/roblox-game-pass-store-used-to-sell-ransomware-decryptor/   
Published: 2022 06 09 19:29:09
Received: 2022 06 10 14:34:40
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Article: Roblox Game Pass store used to sell ransomware decryptor - published over 2 years ago.
Content:
https://www.bleepingcomputer.com/news/security/roblox-game-pass-store-used-to-sell-ransomware-decryptor/   
Published: 2022 06 09 19:29:09
Received: 2022 06 10 14:34:40
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Article: 5 cyber threats facing the education sector - published over 2 years ago.
Content:
https://www.securitymagazine.com/articles/97796-5-cyber-threats-facing-the-education-sector   
Published: 2022 06 10 13:16:34
Received: 2022 06 10 14:34:38
Feed: Security Magazine – All Feeds
Source: Security Magazine
Category: News
Topic: Security
Article: 5 cyber threats facing the education sector - published over 2 years ago.
Content:
https://www.securitymagazine.com/articles/97796-5-cyber-threats-facing-the-education-sector   
Published: 2022 06 10 13:16:34
Received: 2022 06 10 14:34:38
Feed: Security Magazine – All Feeds
Source: Security Magazine
Category: News
Topic: Security
Cyber Tzar Risk Groups Explained
Cyber Tzar Risk Groups Explained
Article: NRF to honor top loss prevention leaders - published over 2 years ago.
Content:
https://www.securitymagazine.com/articles/97797-nrf-to-honor-top-loss-prevention-leaders   
Published: 2022 06 10 14:10:00
Received: 2022 06 10 14:34:38
Feed: Security Magazine – All Feeds
Source: Security Magazine
Category: News
Topic: Security
Article: NRF to honor top loss prevention leaders - published over 2 years ago.
Content:
https://www.securitymagazine.com/articles/97797-nrf-to-honor-top-loss-prevention-leaders   
Published: 2022 06 10 14:10:00
Received: 2022 06 10 14:34:38
Feed: Security Magazine – All Feeds
Source: Security Magazine
Category: News
Topic: Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Score Analysis
Cyber Tzar Score Analysis
Article: Marktforschungsbericht zur elektronischen Personalbeschaffung nach Typ, Komponente ... - published over 2 years ago.
Content: DevSecOps-Markt: nach Typ und Geografie | Globale Prognose bis (2022–2029) – CA Technologies, IBM, MicroFocus, Synopsys. Jun 10, 2022 Sarah Ivans.
http://autoid-ready.de/news/88869/marktforschungsbericht-zur-elektronischen-personalbeschaffung-nach-typ-komponente-brunnentyp-mechanismus-anwendung-region-recruit-linkedin-careerbuilder-monster/   
Published: 2022 06 10 05:00:47
Received: 2022 06 10 14:24:24
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: Marktforschungsbericht zur elektronischen Personalbeschaffung nach Typ, Komponente ... - published over 2 years ago.
Content: DevSecOps-Markt: nach Typ und Geografie | Globale Prognose bis (2022–2029) – CA Technologies, IBM, MicroFocus, Synopsys. Jun 10, 2022 Sarah Ivans.
http://autoid-ready.de/news/88869/marktforschungsbericht-zur-elektronischen-personalbeschaffung-nach-typ-komponente-brunnentyp-mechanismus-anwendung-region-recruit-linkedin-careerbuilder-monster/   
Published: 2022 06 10 05:00:47
Received: 2022 06 10 14:24:24
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: AppSec Decoded: Building Security into DevOps Part 1| Synopsys - YouTube - published over 2 years ago.
Content: In this episode of AppSec Decoded, our cybersecurity experts discuss why DevSecOps initiatives stall or fail and what organizations can do to ...
https://www.youtube.com/watch?v=qrseFylj2ro   
Published: 2022 06 10 13:32:57
Received: 2022 06 10 14:24:23
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: AppSec Decoded: Building Security into DevOps Part 1| Synopsys - YouTube - published over 2 years ago.
Content: In this episode of AppSec Decoded, our cybersecurity experts discuss why DevSecOps initiatives stall or fail and what organizations can do to ...
https://www.youtube.com/watch?v=qrseFylj2ro   
Published: 2022 06 10 13:32:57
Received: 2022 06 10 14:24:23
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Craig Federighi Talks iOS 16 Lock Screen Redesign and More in Annual WWDC Episode of 'The Talk Show' - published over 2 years ago.
Content:
https://www.macrumors.com/2022/06/10/craig-federighi-wwdc-2022-talk-show/   
Published: 2022 06 10 14:17:53
Received: 2022 06 10 14:23:38
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Article: Craig Federighi Talks iOS 16 Lock Screen Redesign and More in Annual WWDC Episode of 'The Talk Show' - published over 2 years ago.
Content:
https://www.macrumors.com/2022/06/10/craig-federighi-wwdc-2022-talk-show/   
Published: 2022 06 10 14:17:53
Received: 2022 06 10 14:23:38
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: How 4 Young Musicians Hacked Sheet Music to Help Fight the Cold War - published over 2 years ago.
Content:
https://www.darkreading.com/edge-articles/-9-57-am-kesten-gayle-how-4-young-musicians-hacked-sheet-music-to-help-fight-the-cold-war   
Published: 2022 06 10 13:50:00
Received: 2022 06 10 14:23:19
Feed: Dark Reading:
Source: Dark Reading
Category: News
Topic: Cyber Security
Article: How 4 Young Musicians Hacked Sheet Music to Help Fight the Cold War - published over 2 years ago.
Content:
https://www.darkreading.com/edge-articles/-9-57-am-kesten-gayle-how-4-young-musicians-hacked-sheet-music-to-help-fight-the-cold-war   
Published: 2022 06 10 13:50:00
Received: 2022 06 10 14:23:19
Feed: Dark Reading:
Source: Dark Reading
Category: News
Topic: Cyber Security
Article: Artificial Intelligence and Security: What You Should Know - published over 2 years ago.
Content:
https://www.darkreading.com/attacks-breaches/artificial-intelligence-and-security-what-you-should-know   
Published: 2022 06 10 14:00:00
Received: 2022 06 10 14:23:18
Feed: Dark Reading:
Source: Dark Reading
Category: News
Topic: Cyber Security
Article: Artificial Intelligence and Security: What You Should Know - published over 2 years ago.
Content:
https://www.darkreading.com/attacks-breaches/artificial-intelligence-and-security-what-you-should-know   
Published: 2022 06 10 14:00:00
Received: 2022 06 10 14:23:18
Feed: Dark Reading:
Source: Dark Reading
Category: News
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: CVE-2022-32563 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-32563   
Published: 2022 06 10 12:15:07
Received: 2022 06 10 14:15:40
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-32563 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-32563   
Published: 2022 06 10 12:15:07
Received: 2022 06 10 14:15:40
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Risk Impact Assesment
Cyber Tzar Risk Impact Assesment
Article: CVE-2022-31788 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-31788   
Published: 2022 06 10 13:15:07
Received: 2022 06 10 14:15:40
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-31788 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-31788   
Published: 2022 06 10 13:15:07
Received: 2022 06 10 14:15:40
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-27502 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-27502   
Published: 2022 06 10 13:15:07
Received: 2022 06 10 14:15:31
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-27502 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-27502   
Published: 2022 06 10 13:15:07
Received: 2022 06 10 14:15:31
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: CVE-2021-44582 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-44582   
Published: 2022 06 10 13:15:07
Received: 2022 06 10 14:15:24
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2021-44582 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-44582   
Published: 2022 06 10 13:15:07
Received: 2022 06 10 14:15:24
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Re-Score Report
Cyber Tzar Re-Score Report
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: CVE-2021-44117 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-44117   
Published: 2022 06 10 13:15:07
Received: 2022 06 10 14:15:24
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2021-44117 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-44117   
Published: 2022 06 10 13:15:07
Received: 2022 06 10 14:15:24
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: Sebi tweaks cyber security, cyber resilience framework for AMCs | The Financial Express - published over 2 years ago.
Content: The new framework will come into force from July 15. Capital markets regulator Sebi on Thursday tweaked the cyber security and cyber resilience ...
https://www.financialexpress.com/market/sebi-tweaks-cyber-security-cyber-resilience-framework-for-amcs/2554584/   
Published: 2022 06 10 08:26:52
Received: 2022 06 10 14:01:55
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Sebi tweaks cyber security, cyber resilience framework for AMCs | The Financial Express - published over 2 years ago.
Content: The new framework will come into force from July 15. Capital markets regulator Sebi on Thursday tweaked the cyber security and cyber resilience ...
https://www.financialexpress.com/market/sebi-tweaks-cyber-security-cyber-resilience-framework-for-amcs/2554584/   
Published: 2022 06 10 08:26:52
Received: 2022 06 10 14:01:55
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Kenya: Govt Moves to Enhance Cyber Security Systems to Protect Digital Economy - published over 2 years ago.
Content: The government has kick-started the process of developing up-to-date cyber security strategies that are geared towards safeguarding and ...
https://allafrica.com/stories/202206100038.html   
Published: 2022 06 10 11:45:26
Received: 2022 06 10 14:01:54
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Kenya: Govt Moves to Enhance Cyber Security Systems to Protect Digital Economy - published over 2 years ago.
Content: The government has kick-started the process of developing up-to-date cyber security strategies that are geared towards safeguarding and ...
https://allafrica.com/stories/202206100038.html   
Published: 2022 06 10 11:45:26
Received: 2022 06 10 14:01:54
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Risk Groups Explained
Cyber Tzar Risk Groups Explained
Article: National Cyber Security Centre certify master's degree - Education Technology - published over 2 years ago.
Content: The National Cyber Security Centre is the UK's technical authority on cybersecurity and has granted the university programme.
https://edtechnology.co.uk/cybersecurity/national-cyber-security-centre-certify-masters-degree/   
Published: 2022 06 10 12:44:09
Received: 2022 06 10 14:01:54
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Article: National Cyber Security Centre certify master's degree - Education Technology - published over 2 years ago.
Content: The National Cyber Security Centre is the UK's technical authority on cybersecurity and has granted the university programme.
https://edtechnology.co.uk/cybersecurity/national-cyber-security-centre-certify-masters-degree/   
Published: 2022 06 10 12:44:09
Received: 2022 06 10 14:01:54
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Article: NATO - News: NATO and the EU Directors General of Military Staffs discuss enhanced ... - published over 2 years ago.
Content: ... cooperation in gender perspectives, emerging and disruptive technologies, cyber security as well as reciprocal exercise participation.
https://www.nato.int/cps/en/natohq/news_196356.htm   
Published: 2022 06 10 13:07:08
Received: 2022 06 10 14:01:54
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Article: NATO - News: NATO and the EU Directors General of Military Staffs discuss enhanced ... - published over 2 years ago.
Content: ... cooperation in gender perspectives, emerging and disruptive technologies, cyber security as well as reciprocal exercise participation.
https://www.nato.int/cps/en/natohq/news_196356.htm   
Published: 2022 06 10 13:07:08
Received: 2022 06 10 14:01:54
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Bitwarden vs LastPass: Compare top password managers - published over 2 years ago.
Content:
https://www.techrepublic.com/article/bitwarden-vs-lastpass/   
Published: 2022 06 10 13:35:14
Received: 2022 06 10 13:47:55
Feed: IT Security Blog | TechRepublic
Source: IT Security Blog | TechRepublic
Category: Cyber Security
Topic: Cyber Security
Article: Bitwarden vs LastPass: Compare top password managers - published over 2 years ago.
Content:
https://www.techrepublic.com/article/bitwarden-vs-lastpass/   
Published: 2022 06 10 13:35:14
Received: 2022 06 10 13:47:55
Feed: IT Security Blog | TechRepublic
Source: IT Security Blog | TechRepublic
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Exploration of the Dirty Pipe Vulnerability (Linux kernel) w/ Debugging Setup - published over 2 years ago.
Content: submitted by /u/martinclauss [link] [comments]
https://www.reddit.com/r/netsec/comments/v97ro3/exploration_of_the_dirty_pipe_vulnerability_linux/   
Published: 2022 06 10 13:28:07
Received: 2022 06 10 13:46:51
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Article: Exploration of the Dirty Pipe Vulnerability (Linux kernel) w/ Debugging Setup - published over 2 years ago.
Content: submitted by /u/martinclauss [link] [comments]
https://www.reddit.com/r/netsec/comments/v97ro3/exploration_of_the_dirty_pipe_vulnerability_linux/   
Published: 2022 06 10 13:28:07
Received: 2022 06 10 13:46:51
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Article: You can be tracked via your Bluetooth signal, researchers claim - published over 2 years ago.
Content:
https://grahamcluley.com/you-can-be-tracked-via-your-bluetooth-signal/   
Published: 2022 06 10 13:28:39
Received: 2022 06 10 13:45:53
Feed: Graham Cluley
Source: Graham Cluley
Category: Cyber Security
Topic: Cyber Security
Article: You can be tracked via your Bluetooth signal, researchers claim - published over 2 years ago.
Content:
https://grahamcluley.com/you-can-be-tracked-via-your-bluetooth-signal/   
Published: 2022 06 10 13:28:39
Received: 2022 06 10 13:45:53
Feed: Graham Cluley
Source: Graham Cluley
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: U.S. Water Utilities Prime Cyberattack Target, Experts - published over 2 years ago.
Content:
https://threatpost.com/water-cyberattack-target/179935/   
Published: 2022 06 10 13:27:12
Received: 2022 06 10 13:42:04
Feed: Threatpost – All Feeds
Source: Threatpost
Category: News
Topic: Cyber Security
Article: U.S. Water Utilities Prime Cyberattack Target, Experts - published over 2 years ago.
Content:
https://threatpost.com/water-cyberattack-target/179935/   
Published: 2022 06 10 13:27:12
Received: 2022 06 10 13:42:04
Feed: Threatpost – All Feeds
Source: Threatpost
Category: News
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Cybersecurity Best Practices for Employees - TechBullion - published over 2 years ago.
Content: Believe it or not, businesses fall prey to at least half of all cybersecurity breaches, according to experts. Phishing scams, password hacks, ...
https://techbullion.com/cybersecurity-best-practices-for-employees/   
Published: 2022 06 10 06:15:41
Received: 2022 06 10 13:41:37
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Cybersecurity Best Practices for Employees - TechBullion - published over 2 years ago.
Content: Believe it or not, businesses fall prey to at least half of all cybersecurity breaches, according to experts. Phishing scams, password hacks, ...
https://techbullion.com/cybersecurity-best-practices-for-employees/   
Published: 2022 06 10 06:15:41
Received: 2022 06 10 13:41:37
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Birmingham university, RazorSecure partner on rail cyber security - Railway Technology - published over 2 years ago.
Content: The University of Birmingham's BCRRE has entered into MoU with RazorSecure for the improvement of railway cyber security.
https://www.railway-technology.com/news/birmingham-university-razorsecure-partner-on-rail-cyber-security/   
Published: 2022 06 10 10:59:26
Received: 2022 06 10 13:41:37
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Birmingham university, RazorSecure partner on rail cyber security - Railway Technology - published over 2 years ago.
Content: The University of Birmingham's BCRRE has entered into MoU with RazorSecure for the improvement of railway cyber security.
https://www.railway-technology.com/news/birmingham-university-razorsecure-partner-on-rail-cyber-security/   
Published: 2022 06 10 10:59:26
Received: 2022 06 10 13:41:37
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Sebi Tweaks AMCs' Cyber Security And Resilience Framework For Investor Protection - published over 2 years ago.
Content: The CyberSecurity And Resilience Guidelines. The new circular mandates every AMC to report any incident of cyberattack within six hours of detection ...
https://www.outlookindia.com/business/sebi-tweaks-amcs-cyber-security-and-resilience-framework-for-investor-protection-news-201564   
Published: 2022 06 10 11:27:52
Received: 2022 06 10 13:41:37
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Sebi Tweaks AMCs' Cyber Security And Resilience Framework For Investor Protection - published over 2 years ago.
Content: The CyberSecurity And Resilience Guidelines. The new circular mandates every AMC to report any incident of cyberattack within six hours of detection ...
https://www.outlookindia.com/business/sebi-tweaks-amcs-cyber-security-and-resilience-framework-for-investor-protection-news-201564   
Published: 2022 06 10 11:27:52
Received: 2022 06 10 13:41:37
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: S: 3 Cybersecurity Stocks Wall Street Predicts Will Rally 30% - 55% - StockNews.com - published over 2 years ago.
Content: SentinelOne, Inc.(NYSE:S): The increasing number of cyber breaches worldwide and the growing demand for cybersecurity is driving the industry's ...
https://stocknews.com/news/s-crwd-ddog-3-cybersecurity-stocks-wall-street-predicts-will-rally-30/   
Published: 2022 06 10 11:33:40
Received: 2022 06 10 13:41:37
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: S: 3 Cybersecurity Stocks Wall Street Predicts Will Rally 30% - 55% - StockNews.com - published over 2 years ago.
Content: SentinelOne, Inc.(NYSE:S): The increasing number of cyber breaches worldwide and the growing demand for cybersecurity is driving the industry's ...
https://stocknews.com/news/s-crwd-ddog-3-cybersecurity-stocks-wall-street-predicts-will-rally-30/   
Published: 2022 06 10 11:33:40
Received: 2022 06 10 13:41:37
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Winning Cybersecurity Stocks From Q1 Earnings - Forbes - published over 2 years ago.
Content: Cybersecurity stocks are insulated from supply chain issues and remain a number one priority across corporate budgets. Q1 earnings showed beats on ...
https://www.forbes.com/sites/bethkindig/2022/06/10/winning-cybersecurity-stocks-from-q1-earnings/   
Published: 2022 06 10 12:25:42
Received: 2022 06 10 13:41:37
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Winning Cybersecurity Stocks From Q1 Earnings - Forbes - published over 2 years ago.
Content: Cybersecurity stocks are insulated from supply chain issues and remain a number one priority across corporate budgets. Q1 earnings showed beats on ...
https://www.forbes.com/sites/bethkindig/2022/06/10/winning-cybersecurity-stocks-from-q1-earnings/   
Published: 2022 06 10 12:25:42
Received: 2022 06 10 13:41:37
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: National Cyber Security Centre certify master's degree - Education Technology - published over 2 years ago.
Content: The National Cyber Security Centre is the UK's technical authority on cybersecurity and has granted the university programme.
https://edtechnology.co.uk/cybersecurity/national-cyber-security-centre-certify-masters-degree/   
Published: 2022 06 10 12:44:09
Received: 2022 06 10 13:41:37
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: National Cyber Security Centre certify master's degree - Education Technology - published over 2 years ago.
Content: The National Cyber Security Centre is the UK's technical authority on cybersecurity and has granted the university programme.
https://edtechnology.co.uk/cybersecurity/national-cyber-security-centre-certify-masters-degree/   
Published: 2022 06 10 12:44:09
Received: 2022 06 10 13:41:37
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Job cuts hit cybersecurity industry despite surging growth from ransomware attacks - CNBC - published over 2 years ago.
Content: Cybersecurity companies are seeing record growth as ransomware attacks increase and businesses bolster spending to protect their data.
https://www.cnbc.com/2022/06/10/job-cuts-hit-cybersecurity-firms-despite-surging-growth-from-attacks.html   
Published: 2022 06 10 13:15:12
Received: 2022 06 10 13:41:37
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Job cuts hit cybersecurity industry despite surging growth from ransomware attacks - CNBC - published over 2 years ago.
Content: Cybersecurity companies are seeing record growth as ransomware attacks increase and businesses bolster spending to protect their data.
https://www.cnbc.com/2022/06/10/job-cuts-hit-cybersecurity-firms-despite-surging-growth-from-attacks.html   
Published: 2022 06 10 13:15:12
Received: 2022 06 10 13:41:37
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: 77 Human Centered Devsecops - SoundCloud - published over 2 years ago.
Content: Listen to discovery playlists featuring 77 Human Centered Devsecops by civictechchat on desktop and mobile.
https://soundcloud.com/user-227289754/77-human-centered-devsecops/sets   
Published: 2022 06 10 10:10:30
Received: 2022 06 10 13:29:59
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: 77 Human Centered Devsecops - SoundCloud - published over 2 years ago.
Content: Listen to discovery playlists featuring 77 Human Centered Devsecops by civictechchat on desktop and mobile.
https://soundcloud.com/user-227289754/77-human-centered-devsecops/sets   
Published: 2022 06 10 10:10:30
Received: 2022 06 10 13:29:59
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Cyber Tzar Marketplace Benchmark
Cyber Tzar Marketplace Benchmark
Article: 8 advantages of DevSecOps automation - Techy Rocks - published over 2 years ago.
Content: DevSecOps is a administration lifecycle method that mixes software planning, supply and monitoring approaches beneath a single framework.
https://techyrocks.com/8-advantages-of-devsecops-automation/   
Published: 2022 06 10 12:16:16
Received: 2022 06 10 13:29:59
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: 8 advantages of DevSecOps automation - Techy Rocks - published over 2 years ago.
Content: DevSecOps is a administration lifecycle method that mixes software planning, supply and monitoring approaches beneath a single framework.
https://techyrocks.com/8-advantages-of-devsecops-automation/   
Published: 2022 06 10 12:16:16
Received: 2022 06 10 13:29:59
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Cyber Tzar Benchmark Summary
Cyber Tzar Benchmark Summary
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Father's Day Deals: The Best Apple Accessory Sales From Sonos, Brydge, eBay, More - published over 2 years ago.
Content:
https://www.macrumors.com/2022/06/10/fathers-day-deals-2022/   
Published: 2022 06 10 13:16:56
Received: 2022 06 10 13:29:09
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Article: Father's Day Deals: The Best Apple Accessory Sales From Sonos, Brydge, eBay, More - published over 2 years ago.
Content:
https://www.macrumors.com/2022/06/10/fathers-day-deals-2022/   
Published: 2022 06 10 13:16:56
Received: 2022 06 10 13:29:09
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Article: Apple's Rumored 12-Inch MacBook Could Be Pro Model With M2 Pro and M2 Max - published over 2 years ago.
Content:
https://www.macrumors.com/2022/06/10/12-inch-macbook-pro-rumor/   
Published: 2022 06 10 13:27:57
Received: 2022 06 10 13:29:09
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Article: Apple's Rumored 12-Inch MacBook Could Be Pro Model With M2 Pro and M2 Max - published over 2 years ago.
Content:
https://www.macrumors.com/2022/06/10/12-inch-macbook-pro-rumor/   
Published: 2022 06 10 13:27:57
Received: 2022 06 10 13:29:09
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Cyber Tzar Change Over Time (Basic)
Cyber Tzar Change Over Time (Basic)
Article: In a Quickly Evolving Landscape, CISOs Shift Their 2022 Priorities - published over 2 years ago.
Content:
https://www.darkreading.com/cloud/quickly-evolving-landscape-cisos-shift-2022-priorities   
Published: 2022 06 10 13:00:05
Received: 2022 06 10 13:28:49
Feed: Dark Reading:
Source: Dark Reading
Category: News
Topic: Cyber Security
Article: In a Quickly Evolving Landscape, CISOs Shift Their 2022 Priorities - published over 2 years ago.
Content:
https://www.darkreading.com/cloud/quickly-evolving-landscape-cisos-shift-2022-priorities   
Published: 2022 06 10 13:00:05
Received: 2022 06 10 13:28:49
Feed: Dark Reading:
Source: Dark Reading
Category: News
Topic: Cyber Security
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Re-Score Report
Cyber Tzar Re-Score Report
Article: Cybersecurity named top driver of legal disputes - published over 2 years ago.
Content:
https://www.securitymagazine.com/articles/97785-cybersecurity-names-top-driver-of-legal-disputes   
Published: 2022 06 10 04:00:00
Received: 2022 06 10 13:22:22
Feed: Security Magazine – All Feeds
Source: Security Magazine
Category: News
Topic: Security
Article: Cybersecurity named top driver of legal disputes - published over 2 years ago.
Content:
https://www.securitymagazine.com/articles/97785-cybersecurity-names-top-driver-of-legal-disputes   
Published: 2022 06 10 04:00:00
Received: 2022 06 10 13:22:22
Feed: Security Magazine – All Feeds
Source: Security Magazine
Category: News
Topic: Security
Article: How Visibility Helps Devs Focus on Innovation - DevOps.com - published over 2 years ago.
Content: A Look at DevSecOps Right Now. We were unable to load Disqus. If you are a moderator please see our troubleshooting guide.
https://devops.com/how-visibility-helps-devs-focus-on-innovation/   
Published: 2022 06 10 12:42:58
Received: 2022 06 10 13:10:33
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: How Visibility Helps Devs Focus on Innovation - DevOps.com - published over 2 years ago.
Content: A Look at DevSecOps Right Now. We were unable to load Disqus. If you are a moderator please see our troubleshooting guide.
https://devops.com/how-visibility-helps-devs-focus-on-innovation/   
Published: 2022 06 10 12:42:58
Received: 2022 06 10 13:10:33
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: What A 650% Rise In Open-Source Software Targeted Hacks Is Teaching Us - published over 2 years ago.
Content:
https://latesthackingnews.com/2022/06/10/what-a-650-rise-in-open-source-software-targeted-hacks-is-teaching-us/   
Published: 2022 06 10 11:54:46
Received: 2022 06 10 13:07:34
Feed: Latest Hacking News
Source: Latest Hacking News
Category: Cyber Security
Topic: Cyber Security
Article: What A 650% Rise In Open-Source Software Targeted Hacks Is Teaching Us - published over 2 years ago.
Content:
https://latesthackingnews.com/2022/06/10/what-a-650-rise-in-open-source-software-targeted-hacks-is-teaching-us/   
Published: 2022 06 10 11:54:46
Received: 2022 06 10 13:07:34
Feed: Latest Hacking News
Source: Latest Hacking News
Category: Cyber Security
Topic: Cyber Security
Article: UK Looks to Trigger Regulation Process to Target Apple's Cloud Gaming and Browser Engine Restrictions - published over 2 years ago.
Content:
https://www.macrumors.com/2022/06/10/uk-to-target-apple-gaming-and-browser-restrictions/   
Published: 2022 06 10 12:34:10
Received: 2022 06 10 12:49:14
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Article: UK Looks to Trigger Regulation Process to Target Apple's Cloud Gaming and Browser Engine Restrictions - published over 2 years ago.
Content:
https://www.macrumors.com/2022/06/10/uk-to-target-apple-gaming-and-browser-restrictions/   
Published: 2022 06 10 12:34:10
Received: 2022 06 10 12:49:14
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Port Vulnerability Scan Report
Article: PacketStreamer - Distributed Tcpdump For Cloud Native Environments - published over 2 years ago.
Content:
http://www.kitploit.com/2022/06/packetstreamer-distributed-tcpdump-for.html   
Published: 2022 06 10 12:30:00
Received: 2022 06 10 12:48:41
Feed: PenTest and Hacking Tools - powered by FeedBurner
Source: PenTest and Hacking Tools - powered by FeedBurner
Category: News
Topic: Security Tooling
Article: PacketStreamer - Distributed Tcpdump For Cloud Native Environments - published over 2 years ago.
Content:
http://www.kitploit.com/2022/06/packetstreamer-distributed-tcpdump-for.html   
Published: 2022 06 10 12:30:00
Received: 2022 06 10 12:48:41
Feed: PenTest and Hacking Tools - powered by FeedBurner
Source: PenTest and Hacking Tools - powered by FeedBurner
Category: News
Topic: Security Tooling
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: iOS 16 cheat sheet: Complete guide for 2022 - published over 2 years ago.
Content:
https://www.techrepublic.com/article/ios-16-cheat-sheet/   
Published: 2022 06 10 12:00:52
Received: 2022 06 10 12:48:21
Feed: IT Security Blog | TechRepublic
Source: IT Security Blog | TechRepublic
Category: Cyber Security
Topic: Cyber Security
Article: iOS 16 cheat sheet: Complete guide for 2022 - published over 2 years ago.
Content:
https://www.techrepublic.com/article/ios-16-cheat-sheet/   
Published: 2022 06 10 12:00:52
Received: 2022 06 10 12:48:21
Feed: IT Security Blog | TechRepublic
Source: IT Security Blog | TechRepublic
Category: Cyber Security
Topic: Cyber Security
Article: DogWalk zero-day Windows bug receives patch – but not from Microsoft - published over 2 years ago.
Content:
https://www.bitdefender.com/blog/hotforsecurity/dogwalk-zero-day-windows-bug-receives-patch-but-not-from-microsoft/   
Published: 2022 06 10 12:37:16
Received: 2022 06 10 12:46:26
Feed: Graham Cluley
Source: Graham Cluley
Category: Cyber Security
Topic: Cyber Security
Article: DogWalk zero-day Windows bug receives patch – but not from Microsoft - published over 2 years ago.
Content:
https://www.bitdefender.com/blog/hotforsecurity/dogwalk-zero-day-windows-bug-receives-patch-but-not-from-microsoft/   
Published: 2022 06 10 12:37:16
Received: 2022 06 10 12:46:26
Feed: Graham Cluley
Source: Graham Cluley
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar SSL Certificate Health Check
Cyber Tzar SSL Certificate Health Check
Article: Latest acquisition announced by The Citation Group | TheBusinessDesk.com - published over 2 years ago.
Content: Mitigate Cyber offers a range of cyber security solutions, from threat mitigation to testing, certification and training, designed to help ...
https://www.thebusinessdesk.com/northwest/news/2098944-latest-acquisition-announced-by-the-citation-group/   
Published: 2022 06 10 06:28:29
Received: 2022 06 10 12:41:46
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Latest acquisition announced by The Citation Group | TheBusinessDesk.com - published over 2 years ago.
Content: Mitigate Cyber offers a range of cyber security solutions, from threat mitigation to testing, certification and training, designed to help ...
https://www.thebusinessdesk.com/northwest/news/2098944-latest-acquisition-announced-by-the-citation-group/   
Published: 2022 06 10 06:28:29
Received: 2022 06 10 12:41:46
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Cyber Tzar SSL Certificate Health Check
Cyber Tzar SSL Certificate Health Check
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Federal government may make reporting cyberattacks mandatory: Mendicino | CBC News - published over 2 years ago.
Content: The Centre for Cyber Security has issued a number of bulletins warning Canadians of the potential for cyberattacks by Russian state-backed actors ...
https://www.cbc.ca/news/politics/mandatory-cyber-attack-reporting-1.6483647   
Published: 2022 06 10 08:02:11
Received: 2022 06 10 12:41:46
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Federal government may make reporting cyberattacks mandatory: Mendicino | CBC News - published over 2 years ago.
Content: The Centre for Cyber Security has issued a number of bulletins warning Canadians of the potential for cyberattacks by Russian state-backed actors ...
https://www.cbc.ca/news/politics/mandatory-cyber-attack-reporting-1.6483647   
Published: 2022 06 10 08:02:11
Received: 2022 06 10 12:41:46
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Article: DNV and Pleiades celebrate 100 years in Greece - Digital Ship - published over 2 years ago.
Content: DNV and Pleiades celebrate 100 years in Greece. Thursday, 09 June 2022 | Communications &amp; Cyber Security · From left to right: Leonidas Karystios, ...
https://thedigitalship.com/news/maritime-satellite-communications/item/7903-dnv-and-pleiades-celebrate-100-years-in-greece   
Published: 2022 06 10 08:56:17
Received: 2022 06 10 12:41:46
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Article: DNV and Pleiades celebrate 100 years in Greece - Digital Ship - published over 2 years ago.
Content: DNV and Pleiades celebrate 100 years in Greece. Thursday, 09 June 2022 | Communications &amp; Cyber Security · From left to right: Leonidas Karystios, ...
https://thedigitalship.com/news/maritime-satellite-communications/item/7903-dnv-and-pleiades-celebrate-100-years-in-greece   
Published: 2022 06 10 08:56:17
Received: 2022 06 10 12:41:46
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Cyber Tzar SSL Certificate Health Check
Cyber Tzar SSL Certificate Health Check
Article: Construction data breaches: Is my data secure in the cloud? - published over 2 years ago.
Content: The conflict in Ukraine has only increased the risk, with the National Cyber Security Centre (NCSC), part of GCHQ, urging businesses to bolster ...
https://www.pbctoday.co.uk/news/guides-reviews/construction-data-breaches-securing-cloud-platforms/111629/   
Published: 2022 06 10 09:59:35
Received: 2022 06 10 12:41:46
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Construction data breaches: Is my data secure in the cloud? - published over 2 years ago.
Content: The conflict in Ukraine has only increased the risk, with the National Cyber Security Centre (NCSC), part of GCHQ, urging businesses to bolster ...
https://www.pbctoday.co.uk/news/guides-reviews/construction-data-breaches-securing-cloud-platforms/111629/   
Published: 2022 06 10 09:59:35
Received: 2022 06 10 12:41:46
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Cyber Tzar SSL Certificate Health Check
Cyber Tzar SSL Certificate Health Check
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: IIT Jodhpur To Launch Centre of Excellence In Cyber-Physical Systems Security - published over 2 years ago.
Content: Commenting on the COE, Professor Santanu Chaudhury, Director, IIT Jodhpur, said: "The biggest cyber security challenge faced by India, ...
https://www.ndtv.com/education/iit-jodhpur-launch-centre-of-excellence-in-cyber-physical-systems-security   
Published: 2022 06 10 10:36:47
Received: 2022 06 10 12:41:46
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Article: IIT Jodhpur To Launch Centre of Excellence In Cyber-Physical Systems Security - published over 2 years ago.
Content: Commenting on the COE, Professor Santanu Chaudhury, Director, IIT Jodhpur, said: "The biggest cyber security challenge faced by India, ...
https://www.ndtv.com/education/iit-jodhpur-launch-centre-of-excellence-in-cyber-physical-systems-security   
Published: 2022 06 10 10:36:47
Received: 2022 06 10 12:41:46
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Article: University of Birmingham: University of Birmingham and RazorSecure sign agreement on ... - published over 2 years ago.
Content: BCRRE's dedicated rail cyber security laboratories develop and test solutions for 'real world' operational systems and identify new explanations ...
https://indiaeducationdiary.in/university-of-birmingham-university-of-birmingham-and-razorsecure-sign-agreement-on-rail-cyber-security/   
Published: 2022 06 10 11:41:54
Received: 2022 06 10 12:41:45
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Article: University of Birmingham: University of Birmingham and RazorSecure sign agreement on ... - published over 2 years ago.
Content: BCRRE's dedicated rail cyber security laboratories develop and test solutions for 'real world' operational systems and identify new explanations ...
https://indiaeducationdiary.in/university-of-birmingham-university-of-birmingham-and-razorsecure-sign-agreement-on-rail-cyber-security/   
Published: 2022 06 10 11:41:54
Received: 2022 06 10 12:41:45
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Article: Cyber Security Today, June 10, 2022 – The Emotet botnet is spreading - IT World Canada - published over 2 years ago.
Content: The Emotet botnet is spreading, a fake Facebook scam and more. Welcome to Cyber Security Today. It's Friday June 10th, 2022. I'm Howard Solomon, ...
https://www.itworldcanada.com/article/cyber-security-today-june-10-2022-the-emotet-botnet-is-spreading/487709   
Published: 2022 06 10 11:57:36
Received: 2022 06 10 12:41:45
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Cyber Security Today, June 10, 2022 – The Emotet botnet is spreading - IT World Canada - published over 2 years ago.
Content: The Emotet botnet is spreading, a fake Facebook scam and more. Welcome to Cyber Security Today. It's Friday June 10th, 2022. I'm Howard Solomon, ...
https://www.itworldcanada.com/article/cyber-security-today-june-10-2022-the-emotet-botnet-is-spreading/487709   
Published: 2022 06 10 11:57:36
Received: 2022 06 10 12:41:45
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Cyber Tzar Score Summary
Cyber Tzar Score Summary
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Kinsta vs WP Engine: Managed WordPress hosting comparison - published over 2 years ago.
Content:
https://www.techrepublic.com/article/kinsta-vs-wp-engine/   
Published: 2022 06 10 08:50:38
Received: 2022 06 10 12:28:27
Feed: IT Security Blog | TechRepublic
Source: IT Security Blog | TechRepublic
Category: Cyber Security
Topic: Cyber Security
Article: Kinsta vs WP Engine: Managed WordPress hosting comparison - published over 2 years ago.
Content:
https://www.techrepublic.com/article/kinsta-vs-wp-engine/   
Published: 2022 06 10 08:50:38
Received: 2022 06 10 12:28:27
Feed: IT Security Blog | TechRepublic
Source: IT Security Blog | TechRepublic
Category: Cyber Security
Topic: Cyber Security
Article: Finding Vulnerabilities with VulFi IDA Plugin | Accenture - published over 2 years ago.
Content: submitted by /u/Martypx00 [link] [comments]
https://www.reddit.com/r/netsec/comments/v950jb/finding_vulnerabilities_with_vulfi_ida_plugin/   
Published: 2022 06 10 10:48:55
Received: 2022 06 10 12:27:22
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Article: Finding Vulnerabilities with VulFi IDA Plugin | Accenture - published over 2 years ago.
Content: submitted by /u/Martypx00 [link] [comments]
https://www.reddit.com/r/netsec/comments/v950jb/finding_vulnerabilities_with_vulfi_ida_plugin/   
Published: 2022 06 10 10:48:55
Received: 2022 06 10 12:27:22
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: CVE-2021-42811 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-42811   
Published: 2022 06 10 11:15:07
Received: 2022 06 10 12:23:23
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2021-42811 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-42811   
Published: 2022 06 10 11:15:07
Received: 2022 06 10 12:23:23
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: CVE-2017-20036 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-20036   
Published: 2022 06 10 10:15:08
Received: 2022 06 10 12:23:19
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2017-20036 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-20036   
Published: 2022 06 10 10:15:08
Received: 2022 06 10 12:23:19
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2017-20035 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-20035   
Published: 2022 06 10 10:15:08
Received: 2022 06 10 12:23:19
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2017-20035 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-20035   
Published: 2022 06 10 10:15:08
Received: 2022 06 10 12:23:19
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Score Analysis
Cyber Tzar Score Analysis
Article: CVE-2017-20034 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-20034   
Published: 2022 06 10 10:15:08
Received: 2022 06 10 12:23:19
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2017-20034 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-20034   
Published: 2022 06 10 10:15:08
Received: 2022 06 10 12:23:19
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Risk Impact Distribution
Cyber Tzar Risk Impact Distribution
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: CVE-2017-20033 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-20033   
Published: 2022 06 10 10:15:08
Received: 2022 06 10 12:23:19
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2017-20033 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-20033   
Published: 2022 06 10 10:15:08
Received: 2022 06 10 12:23:19
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2017-20032 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-20032   
Published: 2022 06 10 10:15:08
Received: 2022 06 10 12:23:19
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2017-20032 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-20032   
Published: 2022 06 10 10:15:08
Received: 2022 06 10 12:23:19
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Risk Impact Assesment
Cyber Tzar Risk Impact Assesment
Article: CVE-2017-20031 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-20031   
Published: 2022 06 10 10:15:08
Received: 2022 06 10 12:23:19
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2017-20031 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-20031   
Published: 2022 06 10 10:15:08
Received: 2022 06 10 12:23:19
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: CVE-2017-20030 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-20030   
Published: 2022 06 10 10:15:08
Received: 2022 06 10 12:23:19
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2017-20030 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-20030   
Published: 2022 06 10 10:15:08
Received: 2022 06 10 12:23:19
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2017-20029 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-20029   
Published: 2022 06 10 10:15:08
Received: 2022 06 10 12:23:19
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2017-20029 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-20029   
Published: 2022 06 10 10:15:08
Received: 2022 06 10 12:23:19
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Risk Groups Explained
Cyber Tzar Risk Groups Explained
Article: タックスケアがガートナー・セキュリティー&リスク・マネジメント・サミット20..(TuxCare ... - published over 2 years ago.
Content: パッチ適用とライセンス管理は、DevSecOpsの重要なワークフローツールであり、大企業のインフラに力を与えるLinux(リナックス)システムのセキュリティーを確保 ...
https://www.zaikei.co.jp/releases/1692216/   
Published: 2022 06 10 08:50:47
Received: 2022 06 10 12:10:49
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: タックスケアがガートナー・セキュリティー&リスク・マネジメント・サミット20..(TuxCare ... - published over 2 years ago.
Content: パッチ適用とライセンス管理は、DevSecOpsの重要なワークフローツールであり、大企業のインフラに力を与えるLinux(リナックス)システムのセキュリティーを確保 ...
https://www.zaikei.co.jp/releases/1692216/   
Published: 2022 06 10 08:50:47
Received: 2022 06 10 12:10:49
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: After a Breach, One Company’s Cybersecurity Claims Got Referenced in a Lawsuit - published over 2 years ago.
Content:
https://www.databreaches.net/after-a-breach-one-companys-cybersecurity-claims-got-referenced-in-a-lawsuit/   
Published: 2022 06 10 11:58:44
Received: 2022 06 10 12:10:21
Feed: DataBreaches.net
Source: DataBreaches.net
Category: Data Breaches
Topic: Data Breaches
Article: After a Breach, One Company’s Cybersecurity Claims Got Referenced in a Lawsuit - published over 2 years ago.
Content:
https://www.databreaches.net/after-a-breach-one-companys-cybersecurity-claims-got-referenced-in-a-lawsuit/   
Published: 2022 06 10 11:58:44
Received: 2022 06 10 12:10:21
Feed: DataBreaches.net
Source: DataBreaches.net
Category: Data Breaches
Topic: Data Breaches
Article: Vermont Enacts Insurance Data Security Law - published over 2 years ago.
Content:
https://www.databreaches.net/vermont-enacts-insurance-data-security-law/   
Published: 2022 06 10 11:58:55
Received: 2022 06 10 12:10:21
Feed: DataBreaches.net
Source: DataBreaches.net
Category: Data Breaches
Topic: Data Breaches
Article: Vermont Enacts Insurance Data Security Law - published over 2 years ago.
Content:
https://www.databreaches.net/vermont-enacts-insurance-data-security-law/   
Published: 2022 06 10 11:58:55
Received: 2022 06 10 12:10:21
Feed: DataBreaches.net
Source: DataBreaches.net
Category: Data Breaches
Topic: Data Breaches
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)

All Articles

Ordered by Date Received : Year: "2022" Month: "06" Day: "10"
Page: << < 4 (of 7) > >>

Total Articles in this collection: 377


  • "All Articles" links back to the front page, effectivly the Planet "Home Page"; shows all articles, with no selections, or groupings.
  • Default date ordering is by "Received Date" (due to not all RSS feeds having a "Published Date").
  • Only Published Date selections use the articles Published Date.
  • The first page always shows fifty items plus from zero to up to a remaining forty-nine items, before they are commited permently to the next page.
  • All subsequent pages show fifty items.
  • Pagination is in reverse ordering (so that pages are permamenent links, aka "permalinks", to their content).
  • "<<" moves you to the first page (aka newest articles)
  • ">>" moves you to the last page (aka oldest articles)
  • "<" moves you to the previous page (aka newer articles)
  • ">" moves you to the next page (aka older articles)
  • Return to the top of this page Go Now

Custom HTML Block

Click to Open Code Editor