New National Cybersecurity Strategy: resilience, regs, collaboration and pain (for attackers)

The Biden administration’s National Cybersecurity Strategy aims to go after attackers, cultivate a resilience-first defensive posture and build public, private and international collaboration. The post New National Cybersecurity Strategy:... Read more »

LastPass releases new security incident disclosure and recommendations

LastPass attacks began with a hacked employee’s home computer. The investigation now reveals the password manager company’s data vault was compromised. The post LastPass releases new security incident disclosure... Read more »

Top 10 open-source security and operational risks of 2023

Many software companies rely on open-source code but lack consistency in how they measure and handle risks and vulnerabilities associated with open-source software, according to a new report. The... Read more »

Google Workspace admins can now use client-side encryption on Gmail and Calendar

Organizations subject to government regulations can gain more control over their own security. The post Google Workspace admins can now use client-side encryption on Gmail and Calendar appeared first... Read more »

1Password is looking to a password-free future. Here’s why

With phishing-based credentials theft on the rise, 1Password CPO Steve Won explains why the endgame is to ‘eliminate’ passwords entirely. The post 1Password is looking to a password-free future.... Read more »

Pen testing report: IT budgets should focus on entire security stack

With nearly 90% of companies reporting cyberattacks, pen testing budgets are on the rise, with cloud infrastructure and services a key focus area, according to a new report. The... Read more »

Digital forensics and incident response: The most common DFIR incidents

A new State of Enterprise DFIR survey covers findings related to automation, hiring, data and regulations and more. The post Digital forensics and incident response: The most common DFIR... Read more »

Transmission of sensitive data policy

Data in transit means data is at risk if the proper precautions aren’t followed. Data stored inside a securely monitored environment is much less likely to fall into the... Read more »

DLL sideloading and CVE attacks show diversity of threat landscape

Studies from Bitdefender and Arctic Wolf show that new tactics are using twists on concealment in social media and old vulnerabilities in third-party software. The post DLL sideloading and... Read more »

Report: Stress will drive a quarter of cyber defenders out the door

There are too few cybersecurity experts to fill jobs, but a new study sees the crunch increasing through 2025 as cybersecurity experts head for the hills. The post Report:... Read more »
Subscribe to our Newsletter