Trust, but verify. While organizations wait for official alerts and notifications from Okta, security teams should also begin their own investigations to determine whether they have been exposed.
Read moreRansomware Group Claims Major Okta Breach
March 22 2022Screenshots that ransomware gang Lapsus$ released this week suggest the threat actor also stole Microsoft source code.
Read moreRed Canary’s Annual Threat Detection Report Reveals Top Threats and Techniques Targeting Most Organizations
March 22 2022Report analyzes 30,000 threats in customer environments to uncover the trends, threats and techniques that comprised the 2021 threat landscape.
Read more‘Spam Nation’ Villain Vrublevsky Charged With Fraud
March 22 2022Pavel Vrublevsky, founder of the Russian payment technology firm ChronoPay and the antagonist in my 2014 book "Spam Nation," was arrested in Moscow this month and charged with fraud....
Read moreLogpoint Unleashes SaaS-Delivered Converged SIEM
March 22 2022Only solution to deliver integrated cloud-based SIEM, SOAR, and UEBA services directly to organizations of all sizes.
Read moreNow available for use with Checkmarx Software Composition Analysis (SCA), the solution restores trust in modern application development while letting developers embrace open source code.
Read moreProven best practices create integrity and trustworthiness.
Read moreZscaler Unveils Security Service Edge Innovations to Protect Enterprises From Cyberattacks
March 22 2022Advancements to the most deployed ZTNA solution strengthen the Zscaler Zero Trust Exchange with new private app protection, deception, and privileged remote access capabilities.
Read moreWhite House Warns of Possible Russian Cyberattacks
March 22 2022News:
The White House has issued its starkest warning that Russia may be planning cyberattacks against critical-sector U.S. companies amid the Ukraine invasion.
[…]
Context: The alert comes after Russia has...
Read more
The Secret to Zero Trust You Need to Know
March 22 2022If every application, device, and bot need access and authentication at some point, the need for managing and controlling the confidential data that allows those functions gets staggeringly large.
Read more
Recent Comments