The Pros and Cons of Managed Firewalls
August 31 2022Managed firewalls are increasingly popular. This post examines the strengths and weaknesses of managed firewalls to help your team decide on the right approach.
Read moreManaged firewalls are increasingly popular. This post examines the strengths and weaknesses of managed firewalls to help your team decide on the right approach.
Read moreNew Golang cyberattacks use deep space images and a new obfuscator to target systems — undetected.
Read moreOpenText makes a $6 billion bet that bigger is better in security and that cybersecurity platform plays are the future.
Read more(ISC)² pledges to expand and diversify the cybersecurity workforce by providing free "(ISC)² Certified in Cybersecurity" education and exams to 1 million people worldwide.
Read moreA security vulnerability (CVE-2022-28799) in one of TikTok for Android's deeplinks could affect billions of users, Microsoft warns.
Read moreLast year, I posted a series of articles about a purported “breach” at Ubiquiti. My sole source for that reporting was the person who has since been indicted by...
Read moreThis is a fun story, detailing the hack a group of high school students perpetrated against an Illinois school district, hacking 500 screens across a bunch of schools.
During...
Read more
While cloud breaches are going to happen, that doesn't mean we can't do anything about them. By better understanding cloud attacks, organizations can better prepare for them. (First of...
Read moreNext-gen platform delivers adaptive and robust, continuous authentication with identity orchestration and a frictionless user experience.
Read moreNext-gen platform delivers adaptive and robust, continuous authentication with identity orchestration and a frictionless user experience.
Read more
Recent Comments