With cybersecurity threat vectors evolving every day and with attackers employing a more innovative and unpredictable approach through combining various types of attack, it’s no surprise that the global... Read more »
IT management is a top concern, with many portfolio companies struggling with IT hygiene, potentially leaving them susceptible to costly breaches, according to a report from BlueVoyant. “When it... Read more »
A recently published study evaluated 1.6 million Microsoft 365 users across three continents, finding that 90% of organizations had gaps in essential security protections. Managing Microsoft 365 (M365) is... Read more »
ReasonLabs has joined the Anti-Malware Testing Standards Organization (AMTSO), an international non-profit association that focuses on addressing the global need for improvement in the objectivity, quality and relevance of... Read more »
Spring Labs launched TrueZero, a tokenization service that enables companies to exchange information with other financial institutions without ever revealing the underlying sensitive data. TrueZero authenticates account information more... Read more »
Google Cloud’s intelligence research and applications team has created and released a collection of 165 YARA rules to help defenders flag Cobalt Strike components deployed by attackers. “Our intention... Read more »
Modern environments have become more dynamic and the need for equally progressive asset discovery techniques has intensified. The new Cybersecurity and Infrastructure Security Agency (CISA) Binding Operational Directive (BOD)... Read more »
The Cybersecurity and Infrastructure Security Agency (CISA) is an agency of the United States Department of Homeland Security. CISA is in charge of enhancing cybersecurity and infrastructure protection at... Read more »
For the first time ever, digitalization is the driving force across the enterprise, according to Advanced’s Mainframe Modernization Business Barometer Report. Organizations aren’t just embracing cloud hyperscalers as infrastructure... Read more »
In this Help Net Security video, Dr. Pedram Hayati, Founder of SecDim, offers a technical write-up based on a secure programming challenge. The task was inspired by a major... Read more »
