Please turn on your JavaScript for this page to function normally.
MITRE ATT&CK D3FEND
MITRE D3FEND: Enabling cybersecurity pros to tailor defenses against specific cyber threats

D3FEND, a framework for cybersecurity professionals to tailor defenses against specific cyber threats is now available through MITRE. NSA funded MITRE’s research for D3FEND to …

SEMPRE launches to provide 5G and edge computing to protect critical infrastructure

SEMPRE emerged from stealth mode. SEMPRE (Secure EMP-Resistant Edge) provides military-grade 5G and high-performance edge computing infrastructure for telecom operators, first …

Veeam Government Solutions: Backup and protection of government mission-critical data

Veeam Software announced the launch of its new, federal government-focused subsidiary, Veeam Government Solutions. Veeam provides a single platform for modernizing backup, …

SS8 to acquire Bivio Networks to strengthen its platform for improved scalability and performance

SS8 Networks announced it has entered into an agreement in which SS8 will acquire the assets of Bivio Networks. Bivio is a developer of innovative, high-performance network …

USA
The future of FISA

News that court-approved Foreign Intelligence Surveillance Act (FISA) searches dropped to new lows in 2020 hit the papers recently, and it raised some eyebrows as well as …

zero
Push past zero trust barriers to securely connect the distributed workforce

If the past year has taught us anything, it’s that trusting a device simply because it originates from inside a corporate network is not a good idea. If an endpoint is …

zero
Approaching zero trust security strategically

With digital transformation efforts accelerating, the attack surface expanding exponentially and conventional perimeter-based security continuing to fail, there’s never been a …

zero
How to avoid 4 common zero trust traps (including one that could cost you your job)

Formulated by a research analyst over a decade ago, the zero-trust security model was embraced by thought leaders. And when Google, with its unlimited budget and resources, …

patch
December 2020 Patch Tuesday forecast: Always consider the risk

The final Patch Tuesday of the year is upon us and what a year it has been. Forcing many changes this year, the pandemic has impacted the way we conduct both security and IT …

China
25 vulnerabilities exploited by Chinese state-sponsored hackers

The US Cybersecurity and Infrastructure Security Agency (CISA) has released a list of 25 vulnerabilities Chinese state-sponsored hackers have been recently scanning for or …

target
NSA warns about Sandworm APT exploiting Exim flaw

The Russian APT group Sandworm has been exploiting a critical Exim flaw (CVE-2019-10149) to compromise mail servers since August 2019, the NSA has warned in a security …

snake
Web shell malware continues to evade many security tools

Cyber attackers are increasingly leveraging web shell malware to get persistent access to compromised networks, the US National Security Agency and the Australian Signals …

Don't miss

Cybersecurity news