How to Effectively Manage a Data Breach

Data breaches are a security nightmare that most CISOs will face at some point in their careers. While most data breaches are not recoverable, security teams can still reduce... Read more »

AI-Assisted Attacks Top Cyber Threat For Third Consecutive Quarter, Gartner Finds

AI-enhanced malicious attacks are a top concern for 80% of executives, and for good reason, as there is a lot of evidence that bad actors are exploiting the technology. Read more »

Increasing Awareness of DNS Hijacking: A Growing Cyber Threat

Read more about DNS hijacking and how organizations can prevent it. Read more »

How to Become a Chief Information Officer: CIO Cheat Sheet

If you want to pursue a path toward becoming a CIO, here’s your guide to salaries, job markets, skills and common interview questions. Read more »

VMWare Explore Barcelona 2024: VMWAre Tanzu Platform 10 Enters General Availability

About a year after Broadcom’s acquisition of VMWare, the company released VMware Tanzu Data Services to make connections to some third-party data engines easier. Read more »

Software Makers Encouraged to Stop Using C/C++ by 2026

CISA and the FBI released a Product Security Bad Practices Report asserting C, C++, and other memory-unsafe languages contribute to potential security breaches. Read more »

How AI Is Changing the Cloud Security and Risk Equation

Discover how AI amplifies cloud security risks and how to mitigate them, with insights from Tenable’s Liat Hayun on managing data sensitivity, misconfigurations, and over-privileged access. Read more »

Midnight Blizzard Escalates Spear-Phishing Attacks On Over 100 Organizations

Russian hackers, known as Midnight Blizzard, launch targeted spear-phishing on U.S. officials, exploiting RDP files to gain access to data. Read more »

Operation Magnus: Joint Law Enforcement Operation Targets Major Infostealer Networks

Read more about a joint operation between several law enforcement agencies in the U.S., Australia, Belgium, Portugal, The Netherlands, and the U.K. to tackle RedLine Stealer and META malware. Read more »

Everything You Need to Know about the Malvertising Cybersecurity Threat

Malvertising is a shortened mash-up of “malicious advertising.” In a nutshell, malvertising is a relatively new cyberattack method in which bad actors inject malicious code into digital ads. These... Read more »
Subscribe to our Newsletter