Exposing Malware in Linux-Based Multi-Cloud Environments

THREAT REPORT: Exposing Malware in Linux-Based Multi-Cloud Environments 90% of cloud runs on Linux. So, is it any wonder that malware is propagating in multi-cloud environments under the radar?... Read more »

Advanced Threat Prevention with VMware NSX Distributed Firewall

Advanced Threat Prevention with VMware NSX Distributed Firewall Security professionals understand that hackers hide lateral movement inside large volumes of east-west network traffic. Organizations need new tools and techniques... Read more »

The security skills shortage is here, here’s how to prepare

Corporate security is near the top of the list of CIO concerns for 2023 — but a security skills shortfall is also a problem. What can companies do to... Read more »

Internal Firewalls for Dummies Guide

Organizations can no longer rely on edge firewalls alone to provide network security. Once attackers get past an edge firewall, they can move laterally to high-value assets. This book... Read more »

Intrusion detection policy

All modern enterprises must accept the fact that at some point their systems or networks will very likely experience an unauthorized intrusion of some kind. This is the state... Read more »

Top industrial IoT security solutions

From safety to where? Find out the right way to turn with this comprehensive analysis of seven options for your business. The post Top industrial IoT security solutions appeared... Read more »

Business email compromise attacks now targeting people via SMS messages

No longer limited to email, BEC attacks are hitting users through text messages in an attempt to steal money or commit other types of fraud, says Trustwave. The post... Read more »

Iranian state-aligned threat actor targets new victims in cyberespionage and kinetic campaigns

New research from Proofpoint exposes a large shift in the TA453 threat actor’s modus operandi, which started conducting more hostile attacks. The post Iranian state-aligned threat actor targets new... Read more »

Improper use of password managers leaves people vulnerable to identity theft

A password manager can be a useful and effective tool for creating, controlling and applying complex and secure passwords, but if you don’t use it the right way, you... Read more »

Security alert: Use these most popular passwords at your peril

Yes, there’s a good chance “123456” is the code to the restroom at your local Starbucks, but it is also the second most popular password worldwide, according to a... Read more »
Subscribe to our Newsletter