Phishing Attack Used Box to Land in Victim Inboxes
August 25 2020A phishing attack targeting government and security organizations used a legitimate Box page with Microsoft 365 branding to trick victims.
Read moreA phishing attack targeting government and security organizations used a legitimate Box page with Microsoft 365 branding to trick victims.
Read moreCriminals are changing tactics to match changing business conditions in the coronavirus pandemic, according to a new report.
Read moreThe largest problem facing database security today is the disconnect between security teams and DBAs beginning from the moment of configuration and continuing throughout the database lifecycle.
Read moreThis is the latest in a series of acquisitions that Palo Alto has made since 2018.
Read moreSimply stated: No matter how sophisticated your security software is, data cannot be simultaneously used and secured. But that may be changing soon.
Read moreOperational technology (OT) asset owners have historically considered red teaming of OT and industrial control system (ICS) networks to be too risky due to the potential for...
Read moreOperational technology (OT) asset owners have historically considered red teaming of OT and industrial control system (ICS) networks to be too risky due to the potential for...
Read moreOperational technology (OT) asset owners have historically considered red teaming of OT and industrial control system (ICS) networks to be too risky due to the potential for...
Read moreOperational technology (OT) asset owners have historically considered red teaming of OT and industrial control system (ICS) networks to be too risky due to the potential for...
Read more
Recent Comments