We commend vets in cyber, with this look at how the training and experience of former military personnel can be a big, differentiating asset in cybersecurity environments.
Read moreTwitter’s CISO Takes Off, Leaving Security an Open Question
November 11 2022Lea Kissner was one of three senior executives to quit this week, leaving many to wonder if the social media giant is ripe for a breach and FTC action.
Read moreLockBit Bigwig Arrested for Ransomware Crimes
November 11 2022A dual Russian-Canadian citizen is being extradited to the US to face charges related to LockBit ransomware activities.
Read moreManaging and Mitigating Risk From Unknown Unknowns
November 11 2022Five practical steps to up-level attack surface management programs and gain greater visibility and risk mitigation around the extended ecosystem.
Read moreEvasive KmsdBot Cryptominer/DDoS Bot Targets Gaming, Enterprises
November 11 2022KmsdBot takes advantage of SSH connections with weak login credentials to mine currency and deplete network resources, as it gains a foothold on enterprise systems.
Read moreCloud storage databases, often deployed as "rogue servers" without the blessing of the IT department, continue to put companies and their sensitive data at risk.
Read moreHow to Close Kubernetes’ Network Security Gap
November 10 2022StackRox bridges network security and other gaps and makes applying and managing network isolation and access controls easier while extending Kubernetes' automation and scalability benefit.
Read moreFlashpoint Releases Ransomware Prediction Model for Vulnerabilities
November 10 2022Links individual vulnerabilities to those known to have been used in ransomware operations, helping vulnerability management teams prevent potential cyber extortion events with VulnDB.
Read moreTechnology consolidates Windows and Linux software risk together in one UI, helping teams manage vulnerabilities and comply with new regulatory standards.
Read more
Recent Comments