We Can Save Security Teams From Crushing Workloads. Will We?
October 7 2022Today, the processing of mountain-high stacks of alarms is considered "security." That system is failing customers and the cybersecurity workforce.
Read moreToday, the processing of mountain-high stacks of alarms is considered "security." That system is failing customers and the cybersecurity workforce.
Read moreTest methodologies published today, and their scope includes security effectiveness, performance, stability and reliability, and total cost of ownership.
Read moreThe Greek journalist Thanasis Koukakis was spied on by his own government, with a commercial spyware product called “Predator.” That product is sold by a company in North Macedonia...
Read moreThe infosec conference named after the UK's calling code returned this year with a focus on building a healthy community.
Read moreThe infosec conference named after the UK's calling code returned this year with a focus on building a healthy community.
Read moreExploit allows unsigned and unnotarized macOS applications to bypass Gatekeeper and other security, without notifying the user.
Read moreRussian-speaking cyberattackers boast they are behind disruption of Colorado, Kentucky, and Mississippi government websites.
Read moreThe trend, spotted by Consumer Reports, could mean good news for organizations struggling to contain remote work challenges.
Read moreCybercriminals are focusing more and more on crafting special email attacks that evade Microsoft Defender and Office security.
Read moreThe malware-as-a-service group Eternity is selling a one-stop shop for various malware modules it's been distributing individually via a subscription model on Telegram.
Read more
Recent Comments