Malicious botnet sources explode in new attacks that push boundaries in terms of volume and duration.
Read moreBetter Collaboration Between Security & Development
June 25 2020Security and development teams must make it clear why their segment of the development life cycle is relevant to the other teams in the pipeline.
Read moreThe recent spread of the distributed denial-of-service tool attempts to exploit a dozen web-framework flaws, uses credential stuffing, and is intended to work against a variety of operating systems.
Read moreAdvanced persistent threat (APT) campaign aims to steal intelligence secrets from foreign companies operating in China.
Read moreApple Buys Fleetsmith
June 24 2020The fleet management company becomes part of Apple in a deal announced today.
Read moreNo Internet Access? Amid Protests, Here’s How to Tell Whether the Government Is Behind it
June 24 2020Government-mandated Internet shutdowns occur far more regularly than you might expect.
Read moreAverage Cost of a Data Breach: $116M
June 24 2020Sensitivity of customer information and time-to-detection determine financial blowback of cybersecurity breaches.
Read moreAnnual "Black Hat USA Attendee Survey" indicates unprecedented concern over possible compromises of enterprise networks and US critical infrastructure.
Read moreRethinking Enterprise Access, Post-COVID-19
June 24 2020New approaches will allow businesses to reduce risk while meeting the needs of users, employees, and third parties. Here are three issues to consider when reimagining enterprise application access.
Read more
Recent Comments