This exclusive bundle includes online dark web monitoring and identity theft support, so don’t miss out on this discounted year-long subscription. Read more »
With Microsoft Defender for Cloud, cloud security posture management features are now available for Google Cloud Platform, as well as AWS and Azure. Read more »
Data from the human vs. machine challenge could provide a framework for government and enterprise policies around generative AI. Read more »
Unmanned aircraft systems, more commonly known as drones, have quite literally taken off by performing many new and inventive commercial applications. Delivering packages, recording terrain, reporting news, documenting wildlife... Read more »
With security schema, Splunk and collaborators aim to transform alert telemetry from cacophony to chorus with one taxonomy across vendors and tools. Read more »
Discover strategies for securing data on your personal Mac for work tasks. Learn how to protect your device against potential threats. Read more »
This attack sent approximately 120,000 phishing emails to organizations worldwide with the goal to steal Microsoft 365 credentials. Read more »
In this Executive Brief by Preetham Gurram, Vice President of Product, Addigy, learn how to proactively manage Apple devices. Read more »
A Black Hat 2023 panel discussed the ramifications of generative AI, and included the former Cyber Czar for the Obama administration. Read more »
As attackers focus on political ends, big payouts, threat hunters need to focus on identity intrusions, access merchants and tactics enabling fast lateral movement. Read more »