Killnet is building its profile, inspiring jewelry sales and rap anthems. But the impact of its DDoS attacks, like the ones that targeted 14 major US hospitals this week,...
Read moreIs it a vulnerability if someone with control over your account can mess with files that your account is allowed to access anyway?
Read moreCompanies need to be aware of the work culture they foster. Diversity and inclusion aren't just buzzwords. Increasing female visibility and improving female mentoring to help women enter and...
Read moreGem Security Emerges From Stealth With $11M, Unveils Cloud TDIR Platform for Faster Response to Cloud Threats
February 2 2023Gem Security provides the world's first holistic approach for Cloud TDIR, bridging the gap between cloud complexity and security operations.
Read moreTwo security holes — one particularly gnarly — could allow hackers the freedom to do as they wish with the popular edge equipment.
Read moreContrast Security Launches Alliance Program to Change the Way Customers Scale Their Security Solutions
February 1 2023The Security Innovation Alliance (SIA) empowers customers to create holistic security programs by leveraging robust end-to-end integration partnerships.
Read moreFortra’s Terranova Security 2022 Gone Phishing Tournament Results Reveal Large Organizations at Highest Risk of Compromising Data
February 1 2023Findings underscore security awareness training that leverages practical, hands-on exercises is essential to creating a security-aware culture.
Read moreKnowBe4 partners with the Center for Cyber Safety and Education to support Black Americans in recognition of Black History Month to help further education.
Read moreApplication Security Must Be Nonnegotiable
February 1 2023Companies need to keep security priorities top of mind during economic downturns so all-important revenue generation doesn't come with a heaping side order of security problems.
Read moreManageEngine Study Finds United States Enterprises Hit by Short-Staffed Security Operations Centers
February 1 2023Study also reveals enterprises rely on multiple tools to ensure cloud security.
Read more
Recent Comments