What You Need for a Strong Security Posture
October 13 2022From the basics to advanced techniques, here's what you should know.
Read moreFrom the basics to advanced techniques, here's what you should know.
Read moreHave your say on three deep questions posed by this week's podcast. Read or listen as suits you best...
Read moreThe campaign uses a combination of tactics and a common JavaScript obfuscation technique to fool both end users and email security scanners to steal credentials.
Read moreThe QAKBOT group has successfully ramped up its operations, infecting systems, installing attack frameworks, and selling access to other groups, including Black Basta.
Read moreDespite dozens of tools and external vendors, 2 in 3 organizations believe their data strategy isn't sustainable beyond three years, which could leave businesses vulnerable.
Read moreDespite dozens of tools and external vendors, 2 in 3 organizations believe their data strategy isn't sustainable beyond three years, which could leave businesses vulnerable.
Read moreNew open source Cloud Hunter tool, developed through Lacework Labs research, helps customers get better visibility to reduce response times for incident investigations.
Read moreCan already beleaguered CISOs now add possible legal charges to their smorgasbord of job considerations? Disclose a breach to comply and face dismissal, or cover it up and face...
Read moreCalifornia just legalized digital license plates, which seems like a solution without a problem.
The Rplate can reportedly function in extreme temperatures, has some customization features, and is managed...
Read more
This marks the third identity and access management (IAM) company acquired by Thoma Bravo in just the past few months.
Read more
Recent Comments