Is XDR Overhyped?
November 17 2021Security experts weigh in on the value and pitfalls of extended detection and response (XDR), offering consideration and advice on this growing new category.
Read moreSecurity experts weigh in on the value and pitfalls of extended detection and response (XDR), offering consideration and advice on this growing new category.
Read moreApple's "Protect Mail Activity" is a handy privacy enhancement for your messaging habits. As long as you know its limitations...
Read moreApple's "Protect Mail Activity" is a handy privacy enhancement for your messaging habits. As long as you know its limitations...
Read moreDeepfakes are already several steps ahead of the technology that can detect and warn us about them.
Read moreEU officials and others previously had blamed Russia's intelligence operations for the so-called Ghostwriter campaign.
Read moreI received email from two people who told me that Microsoft Edge enabled synching without warning or consent, which means that Microsoft sucked up all of their bookmarks. Of...
Read moreThe combination of Team Cymru's threat intelligence and threat hunting capabilities and Amplicy's Internet asset discovery and vulnerability management will give enterprise defenders a comprehensive view of their organization's...
Read moreOther threats to enterprise data include cybercriminals, authorized users, foreign governments, and application vulnerabilities, according to Dark Reading's recent Strategic Security Report.
Read moreMore than half of respondents have 100% of their infrastructure in the cloud; IT playing an increasingly critical role in driving corporate strategy.
Read moreThe popular Trojan has re-emerged on the scene several months after the botnet infrastructure behind it was disrupted by law enforcement.
Read more
Recent Comments