HD Moore's company has rebranded its IT, IoT, and OT asset discovery tool as the platform rapidly evolves.
Read moreAlternative cloud providers offer streamlined capabilities for penetration testing, including more accessible tools, easy deployment, and affordable pricing.
Read moreCybersecurity Solutions Must Evolve, Says Netography CEO
August 22 2022Just as cyber criminals change tactics and strategy for more effectiveness, so must infosec pros and their organizations, according to Martin Roesch of Netography.
Read moreSophos Identifies Potential Tag-Team Ransomware Activity
August 22 2022Company research indicates ransomware gangs may be working in concert to orchestrate multiple attacks, explains Sophos’ John Shier.
Read moreInQuest’s Pedram Amini takes a deep dive into file detection and response as a way to prevent file-borne attacks.
Read moreSecureworks’ Nash Borges describes how his team has applied AI and ML to threat detection.
Read moreNew ‘BianLian’ Ransomware Variant on the Rise
August 22 2022Novel ransomware was created with the Go open source programming language, demonstrating how malware authors increasingly are opting to employ the flexible coding language.
Read moreTanium: Taking A Deeper Cut At Converged Endpoint Management
August 22 2022Tanium’s Chris Hollenbeck explains how converged endpoint management helps overcome obstacles to endpoint visibility.
Read moreWe haven't validated this vuln ourselves... but the source of the story is impeccable. (Impeccably dressed, at least.)
Read morePentera Helps Enterprises Reduce Their Security Exposure
August 22 2022Pentera’s Omer Zucker outlines exposure management’s biggest challenges in closing security gaps.
Read more
Recent Comments