- I gave away my Kindle and iPad within hours of testing this Android tablet
- I tested the Kindle most people should buy. Here's why it's the best e-reader out of the lineup
- I finally found a portable Bluetooth speaker with impeccable sound I can take anywhere
- Cybersecurity: How to Involve People in Risk Mitigation
- This 11-in-1 docking station delivered all the ports I needed - and then some
Lessons from the SolarWinds attack on securing the software supply chain
CSO Online | May 19, 2021 The SolarWinds breach represents a tectonic shift in threat actor tactics, suggesting this kind of attack vector will be replicated. Not only were the attacker’s sophistication and technical proficiency high — allowing them to stay in stealth mode — they also understood the supply chain. Join us to learn how improved identity management and governance surrounding software components, along with workload runtime protection, are critical strategies in guarding against…
Read More