Navigating Nobelium: Lessons From Cloud Hopper & NotPetya
January 28 2022Nearly every organization should assume that it is at risk, but there are ways of countering the tactics used by advanced persistent threats.
Read moreNearly every organization should assume that it is at risk, but there are ways of countering the tactics used by advanced persistent threats.
Read moreIn December 2021, researchers discovered a new ransomware-as-a-service named ALPHV (a.k.a. "BlackCat"), considered to be the first professional cybercrime group to create and use a ransomware strain in the...
Read moreA German activist is trying to track down a secret government intelligence agency. One of her research techniques is to mail Apple AirTags to see where they actually end...
Read moreFewer than one-quarter of organizations believe they are fully prepared for a ransomware attack, threatening data privacy
Read moreE-mail purportedly from human resources convinced more than one-fifth of recipients to click, the majority of whom did so within an hour of receiving the fraudulent message.
Read moreHistorically we've held network conversations to address security problems, but that doesn't work in a cloud-based world.
Read moreTake part in an IFSEC Global survey to better understand the state of access control in 2022.
Read moreLatest episode - listen now!
Read moreAfter companies accelerated their adoption of cloud infrastructure, remote workers are now insiders and pose significant risks, and costs, to companies.
Read moreBarracuda enhances SKOUT Managed XDR offering via new integration with Barracuda Email Protection and alliance with SentinelOne for endpoint protection.
Read more
Recent Comments