- Is this the OnePlus Open 2? Oppo's new foldable phone is as thin as its USB-C port
- 4 surprise products we may see at Samsung Unpacked 2025 - and are worth getting excited for
- Major Cybersecurity Vendors’ Credentials Found on Dark Web
- I made an AirTag that lasts 10 years with this clever accesssory - here's how
- Gen AI ROI falls short of expectations, but belief persists
Why It’s Time to Map the Digital Attack Surface
Around a year ago a cyberattack on a little-known US oil pipeline thrust ransomware into the media spotlight and grabbed the attention of the White House. The ensuing months saw a flurry of government efforts designed to improve the security posture of global organizations, with cyber risk management planted firmly front-and-center of recommended best practices. The cybercriminals responsible for breaching Colonial Pipeline may have unintentionally done a great deal of good for the security community….
Read More