Why the C-Suite Doesn’t Need Access to All Corporate Data
December 6 2021If zero trust is to work properly, then it must apply to everyone.
Read moreIf zero trust is to work properly, then it must apply to everyone.
Read moreRarely do cybercriminal gangs that deploy ransomware gain the initial access to the target themselves. More commonly, that access is purchased from a cybercriminal broker who specializes in stealing...
Read moreFake traffic observed on Nov. 26 included malicious scrapers, sophisticated botnets, fake accounts, and click farms.
Read moreAt least nine US State Department employee iPhones were targeted with sophisticated spyware developed by the Israeli firm NSO Group.
Read moreService gives customers access to a CISO-led team of practitioners with a variety of skills and expertise.
Read moreSqueeze the Squid is a band. It just released its second album. As usual, you can also use this squid post to talk about the security stories in the news...
Read moreOrganizations must improve their cybersecurity protocols to detect fraudulent identities and make sure they're safeguarding their consumers’ personal information.
Read moreMozilla's cryptographic code had a critical bug. Problem is that numerous apps are affected and may need patching individually.
Read moreLogFlow addresses data risks associated with machine data pipelines.
Read moreA new study of 17 malware frameworks shows threat actors always use USB drives to sneak malware into air-gapped environments and then steal data from there.
Read more
Recent Comments