QR Codes Help Attackers Sneak Emails Past Security Controls
October 27 2021A recently discovered campaign shows how attackers are constantly developing new techniques to deceive phishing victims.
Read moreA recently discovered campaign shows how attackers are constantly developing new techniques to deceive phishing victims.
Read moreSecurity researchers who analyzed 97 free EPUB reading applications found half are not compliant with security recommendations.
Read moreBrain4Net builds tools to help enterprises and service providers add SD-WAN and NFV technologies to their existing infrastructure.
Read moreThe latest facts and figures on the state of software supply chain security in the enterprise.
Read moreAs more organizations use application programming interfaces for Web applications, attacks and security incidents targeting APIs continue to grow.
Read moreVice has a detailed article about how the FBI gets data from cell phone providers like AT&T, T-Mobile, and Verizon, based on a leaked (I think) 2019 139-page presentation.
Read moreHow identity and access management strategies held up during the pandemic and tips for putting together an identity security road map.
Read moreThis year's survey features the highest percentage of cyber insurance buyers since the beginning of the survey 11 years ago.
Read moreFormer assistant secretary for cybersecurity, energy security, and emergency response at US Department of Energy and Homeland Security CIO to lead strategic vision and day-to-day operations.
Read moreModule helps hospitals identify, contain, and mitigate threats on devices exhibiting malicious or suspicious behavior.
Read more
Recent Comments