Over the next 100 days, the DoE will work with electric utilities to improve visibility, detection, and response for industrial control systems.
Read more2020 Changed Identity Forever; What’s Next?
April 20 2021For all the chaos the pandemic caused, it also sparked awareness of how important an identity-centric approach is to securing today's organizations.
Read more7 Old IT Things Every New InfoSec Pro Should Know
April 20 2021Beneath all those containers and IoT devices, there's a rich patchwork of gear, protocols, and guidelines that have been holding it together since before you were born. Knowledge of...
Read moreWhat's in a window name? Turns out that it could be a sneaky tracking code, so Firefox has put a stop to that.
Read moreCheck Your Pulse: Suspected APT Actors Leverage Authentication Bypass Techniques and Pulse Secure Zero-Day
April 20 2021Executive Summary Mandiant recently responded to multiple security incidents involving compromises of Pulse Secure VPN appliances. This blog post examines multiple, related...
Read moreCheck Your Pulse: Suspected APT Actors Leverage Authentication Bypass Techniques and Pulse Secure Zero-Day
April 20 2021Executive Summary Mandiant recently responded to multiple security incidents involving compromises of Pulse Secure VPN appliances. This blog post examines multiple, related...
Read moreBeware the Bug Bounty
April 20 2021In recent months, bug-bounty programs have shifted from mitigating risk to inadvertently creating new liabilities for customers and vendors.
Read moreLessons learned from the Unified Coordination Groups will be used to inform future response efforts, a government official says.
Read moreResearchers share a list of passwords that Purple Fox attackers commonly brute force when targeting the SMB protocol.
Read more
Recent Comments