3 SASE Misconceptions to Consider
May 31 2021SASE is all the rage, promising things IT leaders have long dreamed about, but a purist approach may create consequences.
Read moreSASE is all the rage, promising things IT leaders have long dreamed about, but a purist approach may create consequences.
Read moreFake, positive reviews have infiltrated nearly every corner of life online these days, confusing consumers while offering an unwelcome advantage to fraudsters and sub-par products everywhere. Happily, identifying and...
Read moreInteresting research paper. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines here.
Read moreSecurity vendor says it has observed threat groups using a set of 16 tools specifically designed to attack Pulse Secure devices since April 2020.
Read moreAs more organizations make their way to the cloud, their eyes are wide open to the associated cybersecurity risks that tag along for the ride.
Read moreA new study examines the tools and technologies driving investment and activities for security operations centers.
Read moreMicrosoft shares the details of a wide-scale malicious email campaign attributed to Nobelium, the group linked to the SolarWinds supply chain attack.
Read moreCritical infrastructure's cybersecurity problems are complex, deep-rooted, and daunting. Addressing them won't be easy...but it isn't impossible.
Read moreResearchers from Claroty today detailed the memory vuln they discovered in Siemens SIMATIC S7-1200 and S7-1500 PLCs.
Read moreFlorian "The Shark" Tudor, the alleged ringleader of a prolific ATM skimming gang that has stolen hundreds of millions from tourists visiting Mexico over the past eight years, was...
Read more
Recent Comments