Hottest cybersecurity jobs

Cybersecurity is becoming an increasingly more important field than ever before and jobs in this industry will only become more sought after as the years roll by. The post... Read more »

Critical Microsoft vulnerabilities decreased 47% in 2021

Only 104 critical vulnerabilities were reported in 2021, an all-time low for the world’s largest software company. The post Critical Microsoft vulnerabilities decreased 47% in 2021 appeared first on... Read more »

Old Python package comes back to life and delivers malicious payload

A recently spotted supply chain attack abused an old but legitimate Python package to deliver a malicious payload. Read more on how the attacker managed to do it and... Read more »

Microsoft Defender vs Trellix: EDR software comparison

Looking to secure your network? Microsoft Defender and Trellix are two of the most popular endpoint detection and response software options. Compare the features of these EDR tools. The... Read more »

NordLayer makes it easy for businesses to add VPN technology to remote workers

Your enterprise needs a VPN. Consider NordLayer as your solution. The post NordLayer makes it easy for businesses to add VPN technology to remote workers appeared first on TechRepublic. Read more »

Enjoy greater online freedom with Atlas VPN

Protect yourself online with this two-year subscription to the Atlas virtual private network. The post Enjoy greater online freedom with Atlas VPN appeared first on TechRepublic. Read more »

GET 30% OFF DASHLANE FOR YOUR BUSINESS

At Dashlane, we’re passionate about making security simple. Dashlane is used by 20,000+ companies and 15+ million users worldwide. Whether it’s secure sharing, advanced password management, automated employee management,... Read more »

How to develop competency in cyber threat intelligence capabilities

Starting from scratch or maturing a cyber threat intelligence capability is a task that needs several different people with very different skills and competencies. Read more on what competencies... Read more »

Is REvil having a resurgence, or is there a copycat hacking group?

Cybersecurity company Akamai has found one of their clients has suffered a DDoS attack at the hands of a group claiming to be REvil. The post Is REvil having... Read more »

Detecting and Responding to a Ransomware Attack

Ransomware attackers are motivated entirely by money, and they go after your high-value data. If they gain control of it, through encryption or other means (93% of phishing attacks... Read more »
Subscribe to our Newsletter