Ubuntu Pro now available on Amazon Web Services

Read about the features of Ubuntu Pro, and find out how to get it on AWS. The post Ubuntu Pro now available on Amazon Web Services appeared first on... Read more »

Survey: State of cybersecurity in the UK

The U.K. government has released its annual Cyber Security Breaches Survey. Top cybersecurity threats, supply chain risks, incident responses and more are covered. The post Survey: State of cybersecurity... Read more »

Protect your business by developing valuable cybersecurity skills for just $40

There is a shortage of cybersecurity professionals, but you or one of your employees can quickly build on your skills for crucial protection. The post Protect your business by... Read more »

At RSA, Akamai put focus on fake sites, API vulnerabilities

At the RSA Conference Akamai launched a new security platform for fake websites and touted its focus on protecting application protocol interfaces, or APIs. The post At RSA, Akamai... Read more »

InfoBlox discovers rare Decoy Dog C2 exploit

Domain security firm InfoBlox discovered a command-and-control exploit that, while extremely rare and complex, could be a warning growl from a new, as-yet anonymous state actor. The post InfoBlox... Read more »

Juggling critical infrastructure for data centers, hospitals and more, with an eye on resilience

Joseph Vijay, CEO of Intelli-Systems, talks about the challenges of supporting critical infrastructure, and right-sizing data center power portfolios without disruption. The post Juggling critical infrastructure for data centers,... Read more »

Google’s 2FA app update lacks end-to-end encryption, researchers find

Data synced between devices with the new Google Authenticator app update could be viewed by third parties. Google says the app works as planned.  The post Google’s 2FA app... Read more »

Threat actor APT28 targets Cisco routers with an old vulnerability

The U.S., Europe and Ukraine are reportedly targets in this malware threat. Learn how to protect affected Cisco routers. The post Threat actor APT28 targets Cisco routers with an... Read more »

Information security incident reporting policy

PURPOSE This policy from TechRepublic Premium provides guidelines for the reporting of information security incidents by company employees. The goal is to facilitate the security response and remediation process... Read more »

Forrester Wave™: Security Analytics Platforms, Q4 2022 Report

Download the Forrester Wave™: Security Analytics Platforms report to understand the security analytics and SIEM landscape today. The report named Splunk Enterprise Security a “Leader” in security analytics platforms... Read more »
Subscribe to our Newsletter