An investment in due diligence might prevent your organization from being part of next week's breach news cycle.
Read moreThe ‘Groove’ Ransomware Gang Was a Hoax
November 2 2021A number of publications in September warned about the emergence of "Groove," a new ransomware group that called on competing extortion gangs to unite in attacking U.S. government interests...
Read moreThe ‘Groove’ Ransomware Gang Was a Hoax
November 2 2021A number of publications in September warned about the emergence of "Groove," a new ransomware group that called on competing extortion gangs to unite in attacking U.S. government interests...
Read moreHow Hackers Are Targeting Cryptocurrency
November 2 2021Crypto exchanges that want to maintain credibility must implement some of the same "know your customer" controls used by banks and similar institutions.
Read moreOn Cell Phone Metadata
November 2 2021Interesting Twitter thread on how cell phone metadata can be used to identify and track people who don’t want to be identified and tracked.
Read moreHow AI-Driven Security Analytics Speeds Up Enterprise Defense
November 1 2021Fresh off a $250 million Series E round, Devo Technology plans to expand the core security analytics platform with new features to help enterprise defenders work with security data...
Read moreHow AI-Driven Security Analytics Speeds Up Enterprise Defense
November 1 2021Fresh off a $250 million Series E round, Devo Technology plans to expand the core security analytics platform with new features to help enterprise defenders work with security data...
Read moreCISA and Partners Coordinate on Security, Combatting Misinformation for Election Day
November 1 2021CISA will host an election situational awareness room to coordinate with federal partners, state and local election officials, private sector election partners, and political organizations to share real-time information...
Read moreMassive increase in cyberattacks targeting technology and retail industries confirms immediate need for zero-trust security
Read moreResearchers discover a new technique attackers could use to encode vulnerabilities into software while evading detection.
Read more
Recent Comments