This glossary includes the most common terms and expressions TechCrunch uses in our security reporting, and explanations of how — and why — we use them.
Unpatched vulnerabilities in Contec CMS8000 patient monitors expose devices to remote access, file overwrites, and data leaks.
The Southern African Development Community intervention force in the mission in the DRC is outgunned and outmanned.
AMX Global is recalling 22,500 folding stadium seats due to fall and injury hazards. The company has received five reports of ...
Cybersecurity is big business, and tech companies often sell their products based on fear. These campaigns are often rooted in what I call the technology vs.
Through my work, I’ve observed a notable shift in the responsibilities of chief data officers (CDOs) in Latin America.
A top Treasury career staffer is expected to depart. Surrogates of Musk’s DOGE effort had sought access to sensitive payment ...
Just as criminals leverage AI for harm, organizations should integrate AI into their security programs to improve the ...
A potentially crippling entanglement with China is that of our defense and homeland security needs. If that dependence remains, our national security is at risk.
From traditional investigative methods to zero-day exploits, authorities have a range of techniques at their disposal, ...
Picking a security vendor often causes option paralysis for enterprises. While large firms may come with the popular stamp of approval and a larger pool of resources, bigger may not always mean better ...
Some county ordinances require your security company to complete paperwork and pay fees to register your system with first ...