To be most effective, protective DNS services need to constantly reassess and rescore domains as additional data comes in.
Read moreSingle Sign-on: It’s Only as Good as Your Ability to Use It
December 9 2022Increased federal cybersecurity regulations provide a pivot point for manufacturers to reconsider their access management strategy.
Read moreMore than three-quarters of police and emergency responders worry about ransomware attacks and data leaks, while their organizations lag behind in technology adoption.
Read moreAPT37 Uses Internet Explorer Zero-Day to Spread Malware
December 9 2022IE is still a vector: South Koreans lured in with references to the deadly Halloween celebration crowd crush in Seoul last October.
Read moreNew Ransom Payment Schemes Target Executives, Telemedicine
December 9 2022Ransomware groups are constantly devising new methods for infecting victims and convincing them to pay up, but a couple of strategies tested recently seem especially devious. The first centers...
Read moreDon't keep calling home to a JavaScript server that closed its doors eight years ago!
Read moreRapid adoption showcases increased interest in cyber education and training for individuals looking to enter the field while helping decrease the workforce gap.
Read moreInterpres Security Emerges from Stealth to Help Companies to Optimize Security Performance
December 8 2022Startup raises $8.5 million in seed funding led by Ten Eleven Ventures.
Read moreWhere to Find the Best Open Source Security Technology
December 8 2022A free resource, updated monthly, lists the most-popular, highly rated OSS projects.
Read moreReport: Air-Gapped Networks Vulnerable to DNS Attacks
December 8 2022Common mistakes in network configuration can jeopardize the security of highly protected assets and allow attackers to steal critical data from the enterprise.
Read more
Recent Comments