Note From the Editor-in-Chief
A change in ownership and what it means for our readers.
Note From the Editor-in-Chief Read Post »
A change in ownership and what it means for our readers.
Note From the Editor-in-Chief Read Post »
Five steps to take that will allow the infosec team to reduce the risk of trailing the latest transformation changes.
Cyber Agility Mandate – Transforming InfoSec Programs to Meet Evolving Markets Read Post »
Websites these days know everything about you — even some details you might not realize. Hackers can take advantage of
‘White FAANG’ Data Export Attack: A Gold Mine for PII Threats Read Post »
N2WS has unveiled new enhancements to its cloud-native backup and disaster recovery (BDR) platform. These updates empower enterprises and managed
N2WS platform enhancements improve restore time for enterprises and MSPs Read Post »
Phishing attacks increased nearly 40 percent in the year ending August 2024, with much of that growth concentrated at a
Why Phishers Love New TLDs Like .shop, .top and .xyz Read Post »
Cisco on Monday updated an advisory to warn customers of active exploitation of a decade-old security flaw impacting its Adaptive
Cisco Warns of Exploitation of Decade-Old ASA WebVPN Vulnerability Read Post »
LastPass users can take another step toward a password-less world. Here’s how to activate the beta feature now.
LastPass adds passkey support for free and premium users Read Post »
A hacker has posted online over 760,000 records belonging to employees of Bank of America, Koch, Nokia, JLL, Xerox, Morgan
760,000 Employee Records From Several Major Firms Leaked Online Read Post »
When departments independently adopt SaaS applications, the security team often loses visibility and control, making these environments highly vulnerable to
Sweet Security introduces unified Cloud Native Detection and Response platform, designed to transform the way organizations protect their cloud environments
Sweet Security helps organizations protect their cloud environments Read Post »