IT admins can lock some of the obvious open doors in business applications, but system visibility is key. Build automatic monitoring defenses and adopt a Git-like tool so you...
Read more8 Hot Summer Fiction Reads for Cybersecurity Pros
July 27 2022A reading list of recommended novels curated by cybersecurity experts for cybersecurity experts.
Read moreYear-long analysis from Norton Labs finds nearly three-quarters of phishing sites imitate Facebook.
Read moreJust ahead of its headline-grabbing attack on the Italian tax agency, the infamous ransomware group debuted an improved version of the malware featuring parts from Egregor and BlackMatter.
Read moreMicrosoft Tops Brands Phishers Prefer
July 26 2022Wide use of Microsoft 365 applications by business lets phishers easily launch data theft, BEC, ransomware, and other attacks, new report finds.
Read moreInsiders could become more vulnerable to cybercrime recruitment efforts, new report says.
Read moreAI Can Help Fintechs Fight Fraud-as-a-Service
July 26 2022Artificial intelligence tools can help companies strike the right balance between preventing financial crime and maintaining customer service and satisfaction.
Read more
Recent Comments