How to use Microsoft KQL for SIEM insight

Microsoft’s cloud-hosted SIEM software comes with a suite of powerful analytics tools designed to read logs and find anomalies in the data haystack. The post How to use Microsoft... Read more »

Here’s how IT budgets should fill cybersecurity moats in 2023

TechRepublic speaks with Carlos Morales of Neustar Security Services on the best ways for companies to spend on cybersecurity — even if their budgets are tighter. The post Here’s... Read more »

Securing IoT with Microsoft Defender for IoT sensors

Protecting the devices that run your production facilities is increasingly important. How can we secure single-purpose hardware? The post Securing IoT with Microsoft Defender for IoT sensors appeared first... Read more »

How to force Portainer to use HTTPS and upload your SSL certificates for heightened security

If Portainer is your go-to GUI for Docker and Kubernetes, you should consider adding a bit of extra security to the deployment. The post How to force Portainer to... Read more »

Survey: Cybersecurity budgets aren’t matching cybersecurity challenges

A new study finds that due to the growing threat surface from hybrid work and third-party vendors, only half of organizations have the budget to meet current cybersecurity needs.... Read more »

Learn cutting-edge ethical hacking techniques for just $39.99

The 2023 Masters in Cyber Security Certification Bundle includes full online training prep for key cybersecurity exams. The post Learn cutting-edge ethical hacking techniques for just $39.99 appeared first... Read more »

The risks of 5G security

Unless you’ve been living under a rock for the past decade, you’ve probably heard of 5G telecommunications. But what is it? The post The risks of 5G security appeared... Read more »

Recent rise in SEO poisoning attacks compromise brand reputations

A new research report from SentinelOne exposes a SEO poisoning attack campaign that hijacks brand names in paid search ads. The post Recent rise in SEO poisoning attacks compromise... Read more »

How hackers stole the personal data of 37 million T-Mobile customers

The criminals took advantage of an API to grab personal details such as customer names, billing addresses, email addresses, phone numbers, dates of birth, and T-Mobile account numbers. The... Read more »

10 cybersecurity predictions for tech leaders in 2023

From ransomware to third-party vendor security to software-defined perimeters, these cybersecurity topics should be on IT leaders’ radar. The post 10 cybersecurity predictions for tech leaders in 2023 appeared... Read more »
Subscribe to our Newsletter