XDR: What It Is, What It Isn’t
December 14 2021The three must-haves in eXtended Detection and Response are: making data accessible, facilitating real-time threat detection, and providing remediation strategies.
Read moreThe three must-haves in eXtended Detection and Response are: making data accessible, facilitating real-time threat detection, and providing remediation strategies.
Read moreEvery high-profile breach leaves a trail of bread crumbs, and defenders who monitor access brokers can connect the dots and detect attacks as they unfold.
Read moreGovernment actions help starve attack groups of the resources - money, ability to recruit, and time.
Read moreThis Tech Tip outlines how enterprises can use Canarytokens to find servers in their organization vulnerable to CVE-2021-44228.
Read moreThis Tech Tip outlines how enterprises can use Canarytokens to find servers in their organization vulnerable to CVE-2021-44228.
Read moreThe company confirmed last week that one of its file repositories was accessed by a third party.
Read moreCustomers advised to adopt alternative internal processes to support the affected human resources services.
Read moreMore than 60 variants of the original exploit were introduced over the last day alone.
Read moreThe number of bug bounty programs jumped by a third, the median payout for a critical vulnerability report rose to $3,000, but rewards for easier-to-find lower-severity flaws stagnated in...
Read more
Recent Comments