Attempting to catch up with CrowdStrike, Microsoft, and Trend Micro, the Helsinki-based endpoint-protection firm "de-merges" its consumer-security business to focus on businesses.
Read moreBuilding a Red Team: How to Get Started
March 23 2022These groups of authorized hackers work to infiltrate their customer's data, development environment, or any other business area to locate and identify vulnerabilities.
Read moreBuilding a Red Team: How to Get Started
March 23 2022These groups of authorized hackers work to infiltrate their customer's data, development environment, or any other business area to locate and identify vulnerabilities.
Read moreBuilding a Red Team: How to Get Started
March 23 2022These groups of authorized hackers work to infiltrate their customer's data, development environment, or any other business area to locate and identify vulnerabilities.
Read moreVade Receives Patent on Anti-Phishing Tech
March 23 2022The patent covers a technique to detect phishing kits even as the kits utilize defensive mechanisms to avoid detection.
Read moreTrust, but verify. While organizations wait for official alerts and notifications from Okta, security teams should also begin their own investigations to determine whether they have been exposed.
Read moreRansomware Group Claims Major Okta Breach
March 22 2022Screenshots that ransomware gang Lapsus$ released this week suggest the threat actor also stole Microsoft source code.
Read moreRed Canary’s Annual Threat Detection Report Reveals Top Threats and Techniques Targeting Most Organizations
March 22 2022Report analyzes 30,000 threats in customer environments to uncover the trends, threats and techniques that comprised the 2021 threat landscape.
Read more
Recent Comments