Ukraine's Computer Emergency Response Team calls out UNIC1151 nation-state hacking group out of Belarus as behind the attacks.
Read moreTop 5 Interview Questions to Ask DevOps Candidates in 2022
February 25 2022It's worthwhile to find candidates who have experience with models that embed security into their processes.
Read moreThe Future of Cyber Insurance
February 25 2022Having cyber insurance is a good idea if the costs make sense — it could be the difference between going out of business and staying afloat. But it shouldn't...
Read moreThe Future of Cyber Insurance
February 25 2022Having cyber insurance is a good idea if the costs make sense — it could be the difference between going out of business and staying afloat. But it shouldn't...
Read morePutting the X Factor in XDR
February 25 2022While extended detection and response (XDR) is effectively considered an upgrade from endpoint detection and response, enterprises must still begin with a strong EDR foundation.
Read moreIf past is precedent, the cyber impact of the war in Ukraine could be broad and bruising, experts say.
Read moreWhy Developers Should Care About Log4j
February 24 2022Unless you can gain full visibility into how data flows to and through your dependencies, you can’t be sure if you are affected by this vulnerability.
Read moreTrickbot Comes Up With a New Set of Tricks
February 24 2022Late last year, the group behind the malware stopped spreading Trickbot, instead pushing out copies of Emotet and Qbot to infected systems, researchers say.
Read moreInsider Threats Are More Than Just Malicious Employees
February 24 2022Humans are unpredictable and may make mistakes that could result in a security incident.
Read more
Recent Comments