MITRE D3FEND: Enabling cybersecurity pros to tailor defenses against specific cyber threats
D3FEND, a framework for cybersecurity professionals to tailor defenses against specific cyber threats is now available through MITRE. NSA funded MITRE’s research for D3FEND to …
SEMPRE launches to provide 5G and edge computing to protect critical infrastructure
SEMPRE emerged from stealth mode. SEMPRE (Secure EMP-Resistant Edge) provides military-grade 5G and high-performance edge computing infrastructure for telecom operators, first …
Veeam Government Solutions: Backup and protection of government mission-critical data
Veeam Software announced the launch of its new, federal government-focused subsidiary, Veeam Government Solutions. Veeam provides a single platform for modernizing backup, …
SS8 to acquire Bivio Networks to strengthen its platform for improved scalability and performance
SS8 Networks announced it has entered into an agreement in which SS8 will acquire the assets of Bivio Networks. Bivio is a developer of innovative, high-performance network …
The future of FISA
News that court-approved Foreign Intelligence Surveillance Act (FISA) searches dropped to new lows in 2020 hit the papers recently, and it raised some eyebrows as well as …
Push past zero trust barriers to securely connect the distributed workforce
If the past year has taught us anything, it’s that trusting a device simply because it originates from inside a corporate network is not a good idea. If an endpoint is …
Approaching zero trust security strategically
With digital transformation efforts accelerating, the attack surface expanding exponentially and conventional perimeter-based security continuing to fail, there’s never been a …
How to avoid 4 common zero trust traps (including one that could cost you your job)
Formulated by a research analyst over a decade ago, the zero-trust security model was embraced by thought leaders. And when Google, with its unlimited budget and resources, …
December 2020 Patch Tuesday forecast: Always consider the risk
The final Patch Tuesday of the year is upon us and what a year it has been. Forcing many changes this year, the pandemic has impacted the way we conduct both security and IT …
25 vulnerabilities exploited by Chinese state-sponsored hackers
The US Cybersecurity and Infrastructure Security Agency (CISA) has released a list of 25 vulnerabilities Chinese state-sponsored hackers have been recently scanning for or …
NSA warns about Sandworm APT exploiting Exim flaw
The Russian APT group Sandworm has been exploiting a critical Exim flaw (CVE-2019-10149) to compromise mail servers since August 2019, the NSA has warned in a security …
Web shell malware continues to evade many security tools
Cyber attackers are increasingly leveraging web shell malware to get persistent access to compromised networks, the US National Security Agency and the Australian Signals …
Featured news
Resources
Don't miss
- CISA: Use Signal or other secure communications app
- Another NetWalker affiliate sentenced to 20 years in prison
- Why cybersecurity is critical to energy modernization
- Cryptocurrency hackers stole $2.2 billion from platforms in 2024
- CISA orders federal agencies to secure their Microsoft cloud environments