Employees now have the freedom to work wherever they want, which brings new challenges for security teams trying to protect data.
Read moreLog management tools help IT and security teams monitor and improve a system's performance by identifying bugs, cybersecurity breaches, and other issues that can create outages or compliance problems.
Read moreSecurity firms analyze attack paths and seek out weak identities to find compromise vectors and critical assets that need better controls.
Read moreGuardrails need to be set in place to ensure confidentiality of sensitive information, while still leveraging AI as a force multiplier for productivity.
Read moreGlobal Hacking Competition Addresses Critical Increase in Cybersecurity Threats for Businesses
July 8 2023Hack The Box launches Capture The Flag competition, including offensive and defensive challenges, to unite teams as cyberattacks increase in 2023 to unprecedented levels.
Read moreGDPR is halting Meta's new Threads app from entering EU markets, portending a broader struggle over the right ways to collect user data on social apps.
Read moreFriday Squid Blogging: Giant Squid Nebula
July 8 2023A mysterious squid-like cosmic cloud, this nebula is very faint, but also very large in planet Earth’s sky. In the image, composed with 30 hours of narrowband image...
Read more
US and Canadian government agencies find that new variants of the malware are increasingly being utilized.
Read moreWhen the marital infidelity website AshleyMadison.com learned in July 2015 that hackers were threatening to publish data stolen from 37 million users, the company’s then-CEO Noel Biderman was quick...
Read moreSpyware Gamed 1.5M Users of Google Play Store
July 8 2023Malware spoofed file management applications thanks to elevated permissions, enabling exfiltration of sensitive data with no user interaction, researchers find.
Read more
Recent Comments