Cyber Insurance and War Exclusions
March 23 2022Here's what a cybersecurity lawyer thinks security pros need to know in light of Russia's invasion of Ukraine.
Read moreHere's what a cybersecurity lawyer thinks security pros need to know in light of Russia's invasion of Ukraine.
Read moreAttempting to catch up with CrowdStrike, Microsoft, and Trend Micro, the Helsinki-based endpoint-protection firm "de-merges" its consumer-security business to focus on businesses.
Read moreThese groups of authorized hackers work to infiltrate their customer's data, development environment, or any other business area to locate and identify vulnerabilities.
Read moreThese groups of authorized hackers work to infiltrate their customer's data, development environment, or any other business area to locate and identify vulnerabilities.
Read moreThese groups of authorized hackers work to infiltrate their customer's data, development environment, or any other business area to locate and identify vulnerabilities.
Read moreThe patent covers a technique to detect phishing kits even as the kits utilize defensive mechanisms to avoid detection.
Read moreThe Office of Inspector General has audited NASA’s insider threat program:
While NASA has a fully operational insider threat program for its classified systems, the vast majority of the...
Read more
Trust, but verify. While organizations wait for official alerts and notifications from Okta, security teams should also begin their own investigations to determine whether they have been exposed.
Read moreScreenshots that ransomware gang Lapsus$ released this week suggest the threat actor also stole Microsoft source code.
Read more
Recent Comments