Organizations that use the consensus principles can significantly improve their cyber resilience without raising costs, MIT research shows.
Read moreHow social media scammers buy time to steal your 2FA codes
November 22 2022The warning is hosted on a real Facebook page; the phishing uses HTTPS via a real Google server... but the content is all fake
Read moreHow social media scammers buy time to steal your 2FA codes
November 22 2022The warning is hosted on a real Facebook page; the phishing uses HTTPS via a real Google server... but the content is all fake
Read moreBlueVoyant Research Reveals Private Equity Portfolio Company Cybersecurity Challenges
November 21 2022New study identifies critical focus areas for portfolio companies to reduce cyber risks and costs associated with breaches.
Read moreCyber Risk Index report highlights elevated risk as organizations struggle with visibility.
Read moreImproved cyber hygiene keeps users and their identities, devices, and data more secure and reduces the organization’s risk exposure.
Read moreBetter Together: Why It’s Time for Ops and Security to Converge
November 21 2022Threat actors are becoming only more sophisticated and determined.
Read moreBreaking the Zeppelin Ransomware Encryption Scheme
November 21 2022Brian Krebs writes about how the Zeppelin ransomware encryption scheme was broken:
The researchers said their break came when they understood that while Zeppelin used three different types of...
Read more
New Startup OpsHelm Tackles Cloud Misconfigurations
November 19 2022The company emerges from stealth with an automated security remediation product identifies and remediates cloud misconfigurations.
Read moreCharting the Path to Zero Trust: Where to Begin
November 19 2022Begin your journey to trust by rolling out a technology product whic enables true zero trust and may at first seem daunting.
Read more
Recent Comments