Understanding the 3 Classes of Kubernetes Risk
December 21 2022The first step toward securing Kubernetes environments is understanding the risks they pose and identifying the ways in which those risks can be mitigated.
Read moreHow to Run Kubernetes More Securely
December 21 2022The open source container tool is quite popular among developers — and threat actors. Here are a few ways DevOps teams can take control.
Read moreGodfather Banking Trojan Masquerades as Legitimate Google Play App
December 21 2022The malware has resurfaced, using an icon and name similar to the legitimate Google Play app MYT Music, a popular app with more than 10 million downloads.
Read moreWhy Security Teams Shouldn’t Snooze on MFA Fatigue
December 21 2022Employee education, biometric and adaptive authentication, and zero trust can go a long way in strengthening security.
Read moreUkraine Intercepting Russian Soldiers’ Cell Phone Calls
December 21 2022They’re using commercial phones, which go through the Ukrainian telecom network:
“You still have a lot of soldiers bringing cellphones to the frontline who want to talk to their...
Read more
Give Yourself the Gift of Secure Holiday Ecommerce
December 21 2022Automating your defenses can bring good tidings of great joy.
Read morePaying Ransom: Why Manufacturers Shell Out to Cybercriminals
December 21 2022Lower cybersecurity awareness coupled with vulnerable OT gear makes manufacturers tempting targets, but zero trust can blunt attackers’ advantages.
Read moreBfore.Ai Releases ‘The King, The Knight & The Snowball’ – Cybersecurity Book for Children
December 21 2022This unique fairytale is available for free just before Christmas to enjoy with the entire family.
Read moreMicrosoft Warns on ‘Achilles’ macOS Gatekeeper Bypass
December 21 2022The latest bypass for Apple's application-safety feature could allow malicious takeover of Macs.
Read more
Recent Comments