New investment will accelerate growth and expansion of SaaS identity-hygiene platform.
Read moreThe Evolution of Business Email Compromise
November 30 2022The simplicity and profitability of these attacks continue to appeal to threat actors a decade later.
Read moreAPI Secrets: Where the Bearer Model Breaks Down
November 30 2022Current authentication methods are based on the bearer model, but lack of visibility into the entities leveraging API secrets has made this untenable.
Read moreCritical Quarkus Flaw Threatens Cloud Developers With Easy RCE
November 30 2022Red Hat has issued patches for a bug in an open source Java virtual machine software that opens the door to drive-by localhost attacks. Patch now, as it's easy...
Read moreIdentity Digital Releases Its First DNS Anti-Abuse Report
November 30 2022The quarterly report, made possible by its Dynamic Defense™ service, demonstrates significant progress in mitigating domain abuse among its top-level domains (TLDs).
Read moreDelinea Introduces Granular Privileged Access Controls on Servers
November 30 2022New functionality further reduces the risk of lateral movement.
Read moreCyberRatings.org Revives NSS Labs Research
November 30 2022The NSS Labs archive, available with free registration, consists of over 800 test reports, analyst briefs, and research published by NSS Labs from 2013 — 2020.
Read moreFacebook Fined $276M under GDPR
November 30 2022Facebook—Meta—was just fined $276 million (USD) for a data leak that included full names, birth dates, phone numbers, and location. Meta’s total fine by the Data Protection Commission is over...
Read moreConnect the Dots with Genetic Algorithms on CNAPP
November 30 2022Cloud native application protection platforms can apply machine learning algorithms on cloud data to identify accounts with abnormal permissions and uncover potential threats.
Read moreMicrosoft Defender Gets New Security Protections
November 30 2022The new Microsoft Defender for Endpoint capabilities include built-in protection and scanning network traffic for malicious activity.
Read more
Recent Comments