Patch Imperfect: Software Fixes Failing to Shut Out Attackers
February 3 2021Incomplete patches are allowing attackers to continue exploiting the same vulnerabilities, reducing the cost to compromise.
Read moreIncomplete patches are allowing attackers to continue exploiting the same vulnerabilities, reducing the cost to compromise.
Read moreTraditional monitoring approaches are proving brittle as security operations teams need better visibility into dynamic environments.
Read moreSolarWinds' CEO says evidence indicates attackers lurked in the company's Office 365 email system for months ahead of the attack.
Read moreLearn why it's way better to rehearse what to say if you suffer a data breach than to make it up as you go along.
Read moreSecurity pros identify lessons learned that impact how they view infosec today.
Read moreInnovation and complexity can co-exist; the key is to use innovation to make ever-expanding complexity comprehensible and its effects predictable.
Read more
Microsoft analyzed details of the SolarWinds attack:
Microsoft and FireEye only detected the Sunburst or Solorigate malware in December, but Crowdstrike reported this month that another...
Read more
Some 66% of organizations say they have slowed deploying an app into production because of API security concerns.
Read moreThe Federal Trade Commission said a surge in reports of identity theft occurred amid the COVID-19 pandemic.
Read moreA new version of the remote access Trojan targets Microsoft Anti-Malware Software Interface to bypass endpoint detection.
Read more
Recent Comments