The current state of risk assessments is in serious need of an upgrade. Risk assessment isn’t the sexiest topic, but it can’t be ignored, especially when...
Some of the country’s leading technology companies have committed to investing billions of dollars in strengthening cybersecurity defenses and in training skilled workers, the White House...
Virtual patching can help you maximize cybersecurity ROI It’s every chief information security officer’s (CISO) nightmare: that midnight phone call from your security team telling you...
Though not officially confirmed, the U.S. State Department was reportedly a victim of a cyberattack. The attack led the Department of Defense Cyber Command to send...
Heath Anderson, Director of Information Security and Technology at LogicGate, discusses how to build business and operational resiliency with a governance, risk management and compliance (GRC) program....
According to the Cybersecurity and Infrastructure Security Agency (CISA), malicious cyber actors are actively exploiting the following ProxyShell vulnerabilities: CVE-2021-3447, CVE-2021-3452, and CVE-2021-3120. An attacker exploiting these vulnerabilities could...
New research Linux Threat Report 2021 1H from Trend Micro found Linux operating systems are being targeted – with nearly 13 million detections from the first half of 2021...
According to a new survey, 80% of global organizations report they will experience a data breach that impacts customer data in the next 12 months. The...
Recently, Cloudflare automatically detected and mitigated a 17.2 million request-per-second (rps) DDoS attack, an attack almost three times larger than previously ever reported. For perspective on...
Area 1 Security published the results of “It Started Out With A Phish,” a new study analyzing over 31 million threats across multiple organizations and industries, with new findings...
Recent Comments