Log4j Reveals Cybersecurity’s Dirty Little Secret
December 22 2021Once the dust settles on Log4j, many IT teams will brush aside the need for the fundamental, not-exciting need for better asset and application management.
Read moreOnce the dust settles on Log4j, many IT teams will brush aside the need for the fundamental, not-exciting need for better asset and application management.
Read morePhew! An audacious crime... that didn't work out.
Read moreThe US has returned $154 million in bitcoins stolen by a Sony employee. However, on December 1, following an investigation in collaboration with Japanese law enforcement authorities, the FBI seized...
Read moreZero trust may be one of the hottest trends in cybersecurity, but just eliminating trust from networks isn’t enough to prevent successful organizational data breaches, says Wes Wright, CTO...
Read moreZero trust may be one of the hottest trends in cybersecurity, but just eliminating trust from networks isn’t enough to prevent successful organizational data breaches, says Wes Wright, CTO...
Read moreThe functionality of all-in-one platforms is being deconstructed into a smorgasbord of services that can be used to develop bespoke end-user security procedures for specific work groups, lines of...
Read moreThe UK's NCA and NCCU have shared 225 million stolen emails and passwords with HIBP, which tracks stolen credentials.
Read moreThe Facebook parent company seeks court's help in identifying the individuals behind some 39,000 websites impersonating its brands to collect login credentials.
Read moreThe Facebook parent company seeks court's help in identifying the individuals behind some 39,000 websites impersonating its brands to collect login credentials.
Read moreData from dozens of penetration tests and security assessments suggest nearly every organization can be infiltrated by cyberattackers.
Read more
Recent Comments