A vulnerability in AWS IAM Authenticator for Kubernetes could allow a malicious actor to impersonate other users and escalate privileges in Kubernetes clusters, a security researcher...
https://player.vimeo.com/video/726674508?h=7c67176709&badge=0&autopause=0&player_id=0&app_id=58479&dnt=1 As companies’ valuations tumble, so is their wrangling of the cloud. Even the experts are having a tough time with it – so much so...
SMB owners across the globe are still relying only on usernames and passwords to secure critical employee, customer, and partner data, according to the Global Small...
Security teams have a challenging job. They must manage an ever-expanding attack surface and protect huge volumes of data from bad actors who are constantly evolving...
Ivanti worked with global digital transformation experts and surveyed 10,000 office workers, IT professionals, and the C-Suite to evaluate the level of prioritization and adoption of DEX...
A new report from security researcher and TLS expert Scott Helme, evaluates the use of encryption across the world’s top one million sites over the last six...
https://player.vimeo.com/video/724772047?h=444cc56f8c&badge=0&autopause=0&player_id=0&app_id=58479&dnt=1 In 2021, the demand for data privacy jobs soared with no indication of slowing down and stemming from the proliferation of new government regulations and...
A recently-patched security hole in Chromium browsers allowed attackers to bypass safeguards against dangling markup injection’, an attack that extracts sensitive information from webpages. While dangling markup...
https://player.vimeo.com/video/724446833?h=40fe1e4969&badge=0&autopause=0&player_id=0&app_id=58479&dnt=1 Gen Zers might seem like digital pros but, they often aren’t armed with enough resources to keep themselves safe online. The FBI reported that, in...
It’s no secret that digital interactions have extended to every aspect of our professional and personal lives. Connectivity is soaring and digital transformation is accelerating, making...