Get Norton 360 Standard on 2 Devices Plus Identity Theft Protection for $24.99

This exclusive bundle includes online dark web monitoring and identity theft support, so don’t miss out on this discounted year-long subscription. Read more »

Microsoft Defender for Cloud Gets More Multicloud

With Microsoft Defender for Cloud, cloud security posture management features are now available for Google Cloud Platform, as well as AWS and Azure. Read more »

DEF CON Generative AI Hacking Challenge Explored Cutting Edge of Security Vulnerabilities

Data from the human vs. machine challenge could provide a framework for government and enterprise policies around generative AI. Read more »

Drone Usage Policy

Unmanned aircraft systems, more commonly known as drones, have quite literally taken off by performing many new and inventive commercial applications. Delivering packages, recording terrain, reporting news, documenting wildlife... Read more »

At Black Hat, Splunk, AWS, IBM Security and Others Launch Open Source Cybersecurity Framework

With security schema, Splunk and collaborators aim to transform alert telemetry from cacophony to chorus with one taxonomy across vendors and tools. Read more »

5 Tips for Securing Data When Using a Personal Mac for Work

Discover strategies for securing data on your personal Mac for work tasks. Learn how to protect your device against potential threats. Read more »

Massive EvilProxy Phishing Attack Campaign Bypasses 2FA, Targets Top-Level Executives

This attack sent approximately 120,000 phishing emails to organizations worldwide with the goal to steal Microsoft 365 credentials. Read more »

Minimizing Risk Through Proactive Apple Device Management: Addigy

In this Executive Brief by Preetham Gurram, Vice President of Product, Addigy, learn how to proactively manage Apple devices. Read more »

Black Hat USA 2023 Panel: Used Correctly, Generative AI is a Boon for Cybersecurity

A Black Hat 2023 panel discussed the ramifications of generative AI, and included the former Cyber Czar for the Obama administration. Read more »

CrowdStrike at BlackHat: Speed, Interaction, Sophistication of Threat Actors Rising in 2023

As attackers focus on political ends, big payouts, threat hunters need to focus on identity intrusions, access merchants and tactics enabling fast lateral movement. Read more »
Subscribe to our Newsletter