CISA advisory on LockBit: $91 million extorted from 1,700 attacks since 2020

FBI, CISA and international organizations released an advisory detailing breadth and depth of LockBit, and how to defend against the most prevalent ransomware of 2022 and (so far) 2023.... Read more »

Hiring kit: Cryptographer

A cryptographer uses their expertise in mathematics and computer science to develop algorithms, ciphers and other encryption systems to protect sensitive data. It can be a difficult position to... Read more »

New phishing and business email compromise campaigns increase in complexity, bypass MFA

Read the technical details about a new AiTM phishing attack combined with a BEC campaign as revealed by Microsoft, and learn how to mitigate this threat. The post New... Read more »

Cyberattacks surge to 61% of small and medium-sized businesses, says study

A poll of security software buyers shows 39% of small and medium-sized businesses lost customer data due to cyberattacks. The post Cyberattacks surge to 61% of small and medium-sized... Read more »

DDoS threats and defense: How certain assumptions can lead to an attack

The assumptions a business shouldn’t make about its DDoS defenses and the steps it should take now to reduce its likelihood of attack. The post DDoS threats and defense:... Read more »

Google’s ChromeOS aims for enterprise with security and compatibility

Google’s ChromeOS is not just for Chromebooks. Thomas Riedl, the Google unit’s head of enterprise, sees big growth opportunities for the OS where security and versatility matter most. The... Read more »

Equipment reassignment checklist

The reassignment of existing equipment takes place when employees leave the organization or receive new computers, mobile devices, printers and other assets. It is essential to follow strict guidelines... Read more »

Firm study predicts big spends on generative AI

A new study polling software buyers at businesses worldwide finds strong intention to increase budget, with special interest in AI. It also looks at how vendors can engage buyers.... Read more »

BBC, British Airways, Boots hit with hackers’ ultimatum after suffering MOVEit supply-chain attack

Get the details about the ransomware group Clop’s ultimatum to companies they recently hit with a supply-chain attack. Also, learn cybersecurity mitigation best practices for any organization. The post... Read more »

Duo vs Microsoft Authenticator (2023): In-depth comparison

This is a comparison of Duo and Microsoft Authenticator. Learn more about their key differences, features, security, and performance in this in-depth analysis. The post Duo vs Microsoft Authenticator... Read more »
Subscribe to our Newsletter