The IT and OT security providers will integrate solutions aimed at improving critical infrastructure security
Read moreWhen AI Becomes the Hacker
May 13 2021Bruce Schneier explores the potential dangers of artificial intelligence (AI) systems gone rogue in society.
Read moreNew capabilities let admins restrict access to resources from privileged access workstations or regions based on GPS location.
Read moreBusiness continuity plans that address natural and manmade disasters can help turn a cataclysmic business event into a minor slowdown.
Read moreCybersecurity attackers follow the same principles practiced in warfare for millennia. They show up in unexpected places, seeking out portions of an organization's attack surface that are largely unmonitored...
Read moreVerizon's Data Breach Investigations Report (DBIR) covers 2020 -- a year like no other. Phishing, ransomware, and innovation caused big problems.
Read moreMany organizations remain unprepared to detect, respond, and contain a breach, a new survey shows.
Read moreThe apps are disguised as financial trading, banking, and cryptocurrency apps from well-known and trusted organizations.
Read morePutting The Spotlight on DarkSide
May 12 2021Incident responders share insight on the DarkSide ransomware group connected to the recent Colonial Pipeline ransomware attack.
Read more
Recent Comments