Armis, Honeywell Uncover Vulnerabilities in Honeywell Systems

Newly discovered vulnerabilities in distributed control systems could allow attackers access to systems supporting industrial, energy, chemical and other operations. Read more »

Using Snapshots to Improve Data Security

How snapshots — point-in-time copies of data — can improve data security. Read more »

Scarleteel Threat Targets AWS Fargate, Launches DDoS and Cryptojacking Campaigns

The Scarleteel threat targets AWS Fargate environments for data theft and more malicious types of attacks such as cryptojacking and DDoS. Learn how to mitigate this threat. Read more »

White House Launches Cybersecurity Implementation Plan

The White House has announced the first iteration of the National Cybersecurity Implementation Plan. Read on to learn more about the plan and alignment with the five essential pillars. Read more »

How to Check If Someone Else Accessed Your Google Account

Review your recent Gmail access, browser sign-in history and Google account activity to make sure no one other than you has used your account. Read more »

Gartner: Due to stress, half of cyber leaders will change jobs, and a quarter will quit the field

Among the strategic propositions in Gartner’s 2023-2024 cybersecurity outlook are that organizations need to institute cultural changes to lower pressure on security teams. Read more »

How Google Keeps Company Data Safe While Using Generative AI Chatbots

Google’s Behshad Behzadi weighs in on how to use generative AI chatbots without compromising company information. Read more »

Hiring Kit: Security Architect

Developing and implementing both preventive security protocols and effective response plans is complicated and requires a security architect with a clear vision. This hiring kit from TechRepublic Premium provides... Read more »

Brute Force and Dictionary Attacks: A Guide for IT Leaders

It’s essential that cybersecurity professionals understand the risks associated with brute force attacks. Read this guide from TechRepublic Premium to find out what you need to know about this... Read more »

Cisco Talos Reports Microsoft Windows Policy Loophole Being Exploited by Threat Actor

Learn how a malicious driver exploits a loophole in the Windows operating system to run at kernel level. The post Cisco Talos Reports Microsoft Windows Policy Loophole Being Exploited... Read more »
Subscribe to our Newsletter