With at least 13,000 compromised devices in the data leak, it is still unknown who the threat actor is or whether or not victims will be personally notified.
Read moreSocial Engineering Adds Depth to Red Team Exercises
June 29 2023Because social engineering usually succeeds, companies need to test whether their defenses can block adversaries that gain employees' trust.
Read moreAstrix Security Raises $25M in Series A Funding
June 29 2023The investment will allow enterprises to further secure non-human identities and safely leverage the soaring adoption of third-party apps and Generative AI services.
Read moreCato Networks Revolutionizes Network Security With Real-Time, Machine Learning-Powered Protection
June 29 2023The combination of data science expertise, cloud resources, and Cato's vast data lake enables real-time, ML-powered protection against evasive cyberattacks, reducing risk and improving security.
Read moreSurvey also uncovers 63% of respondents distrust ChatGPT while 51% question AI's ability to improve Internet safety.
Read moreHalf-day virtual Authenticate Summit to educate on how passkeys can fit into a variety of enterprise environments.
Read moreTechnically, it's "up to $10 million", but it's potentially a LOT of money, nevertheless...
Read moreSaudi Arabia is one of the world's leaders in cybersecurity development and preparedness, according to the latest rankings.
Read moreDevelopers' enthusiasm for ChatGPT and other LLM tools leaves most organizations largely unprepared to defend against the vulnerabilities that the nascent technology creates.
Read more3 Strategies for Bringing Rigor to Software Security
June 28 2023With the National Cybersecurity Strategy planning to add real teeth into enforcement actions, software vendors have extra incentive to reduce applications' security debt.
Read more
Recent Comments