Not just that infamous Twitter hack, but SIM-swapping, stalking and swatting too...
Read moreIn this day of "not if, but when" for breaches, transparency and full disclosure are important to salvage a company's reputation and keep public trust.
Read moreAD bridging extends the reach of your AD domain to non-Windows systems, providing centralized security, single sign-on, and compliance.
Read moreFriday Squid Blogging: Giggling Squid
June 24 2023Giggling Squid is a Thai chain in the UK. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t...
Read moreIdentity threat detection and response adds user entity behavioral analytics to fraud detection, creating a powerful tool for real-time protection.
Read moreSilobreaker Unveils Geopolitical Threat Intelligence Capabilities With RANE at Infosecurity Europe 2023
June 24 2023Integration provides threat intel teams with an early warning system for geopolitical events that could trigger cyberattacks.
Read moreIt's unclear why the NSA issued in-depth mitigation guidance for the software boot threat now, but orgs should take steps to harden their environments.
Read moreSuspicious Smartwatches Mailed to US Army Personnel
June 24 2023Unknown senders have been shipping smartwatches to service members, leading to questions regarding what kind of ulterior motive is at play, malware or otherwise.
Read moreExploiting a flaw in how the app handles communication with external tenants gives threat actors an easy way to send malicious files from a trusted source to an organization's...
Read moreFor line-of-business execs, the fear of grinding mission-critical systems to a halt overrides the fear of ransomware. How can CISOs overcome this?
Read more
Recent Comments