APTs, Teleworking, and Advanced VPN Exploits: The Perfect Storm
October 29 2021A Mandiant researcher shares the details of an investigation into the misuse of Pulse Secure VPN devices by suspected state-sponsored threat actors.
Read moreA Mandiant researcher shares the details of an investigation into the misuse of Pulse Secure VPN devices by suspected state-sponsored threat actors.
Read moreCourt documents say Vladimir Dunaev is alleged to have been a malware developer for the Trickbot Group.
Read moreWhile car makers are paying more attention to cybersecurity, the evolution of automobiles into "software platforms on wheels" and the quick adoption of new features has put connected cars...
Read moreWhile car makers are paying more attention to cybersecurity, the evolution of automobiles into "software platforms on wheels" and the quick adoption of new features has put connected cars...
Read moreAny company that supports a hybrid workforce should at least be familiar with this relatively new security approach.
Read moreTrue-life horrors from conversations with software engineers and developers. D'oh!
Read moreTrue-life horrors from conversations with software engineers and developers. D'oh!
Read moreCloud security is maturing — it has to. New strategies are surfacing to respond to new problems. Dr. Mike Lloyd, RedSeal's CTO, reviews one of the latest: CSPM.
Read moreIt's hard enough to fill a cybersecurity position given the talent shortage. But you may be making it harder with a poor job description that turns off would-be candidates.
Read more
Recent Comments