8 Reasons Perimeter Security Alone Won’t Protect Your Crown Jewels
September 16 2020Most firewalls and security devices effectively protect systems and data, but are they enough to safeguard business-critical applications?
Read moreMost firewalls and security devices effectively protect systems and data, but are they enough to safeguard business-critical applications?
Read moreThe Cybersecurity and Infrastructure Security Agency will become a peer of MITRE in the CVE program, likely leading to continued increases in disclosed vulnerabilities.
Read moreSecurity Pro File: Award-winning computer scientist and electronic voting expert Barbara Simons chats up her pioneering days in computer programming, paper-ballot backups, Internet voting, math, and sushi.
Read moreWhile the demand for cybersecurity talent rebounds, organizations will need to focus on cyber-enabled roles to fill immediate skills gaps.
Read moreThe Grugq has written an excellent essay on how the Russian cybercriminal gang FIN7 operates. An excerpt:
The secret of FIN7’s success is their operational art of cyber crime....
Read more
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and...
Read moreAs more organizations face disruptions, a defined approach to recovery is imperative so they can successfully recover, experts say.
Read moreThe pandemic-related shift to remote work and the growing availability of ransomware-as-a-service were two major drivers, CrowdStrike says.
Read moreWithout the right reinforcements, you could be barking at the moon.
Read more
Recent Comments