Please turn on your JavaScript for this page to function normally.
SolarWinds hackers are going after cloud, managed and IT service providers

Nobelium, the advanced, persistent threat (APT) actor behind the 2020 SolarWinds supply chain attack that served as a springboard for breaching a variety of high-level …

ransomware
Ransomware: How bad is it going to get?

Ransomware started out with attackers encrypting individual users’ files, demanding a few hundred dollars, and giving the victim a key to unlock their files once they paid up. …

Why cybersecurity leaders should focus on spending, people and technology (in that order)

The cybersecurity industry is facing greater challenges than ever before. The number of publicly-reported data compromises continues to rise, partially due to the massive …

zero
Network and IoT security in a zero trust security model

You can never be too careful when it comes to network and IoT security. With a rapidly growing number of disparate devices being connected to corporate and industrial …

tools
How to implement secure configurations more quickly

Secure configurations are a key best practice for limiting an organization’s cyber vulnerabilities. Since systems don’t ship securely, it’s important to review and implement …

bot protection
Despite spending millions on bot mitigation, 64% of organizations lost revenue due to bot attacks

A Kasada survey covers the state of bot mitigation exclusively from the perspective of organizations already using anti-bot solutions. The state of bot mitigation 64% of …

organize
Security leaders facing challenges in managing and securing distributed work environments

Absolute Software announced new insights into how organizations are rethinking and rebuilding their operating models after more than 18 months of remote work forced massive …

struggle
Data engineers burnout overwhelming, a wake-up call to organizations

A Wakefield Research survey reveals a disturbing state of affairs among data engineering professionals. The study of 600 data engineers suggests an overwhelming majority are …

week in review
Week in review: MITRE ATT&CK v10 released, BEC scammers’ latest tricks, WFH security tactics

Here’s an overview of some of last week’s most interesting news, articles and interviews: Released: MITRE ATT&CK v10 MITRE Corporation has released the tenth …

MITRE ATT&CK
Released: MITRE ATT&CK v10

MITRE Corporation has released the tenth version of ATT&CK, its globally accessible (and free!) knowledge base of cyber adversary tactics and techniques based on …

New infosec products of the week: October 22, 2021

Here’s a look at the most interesting product releases from the past week, featuring releases from SecLytics, SecurID, Splunk, ThreatConnect and ZeroFox. ThreatConnect …

shield
CDR: The secret cybersecurity ingredient used by defense and intelligence agencies

It’s very rare that the defense and intelligence community is vulnerable to file-based attacks. After all, for these organizations security is not a business case, it’s a case …

Don't miss

Cybersecurity news