A reporter once asked the infamous bank robber Willie Sutton, “Why do you rob banks?” Sutton’s answer: “Because that’s where the money is.” Whether that conversation...
Software intelligence company Dynatrace announced the findings of an independent global survey of 700 CISOs, which reveals the rising adoption of cloud-native architectures, DevOps, and agile methodologies has broken...
Radware’s recently released “Quarterly DDoS Attack Report, which provides an overview of attack activity witnessed during the first quarter of 2021, found that while the total...
Proofpoint, Inc. and Ponemon Institute released the results of a new study on “The Cost of Cloud Compromise and Shadow IT.” The average cost of cloud account compromises reached $6.2...
ThycoticCentrify, a provider of cloud identity security solutions formed by the merger of privileged access management (PAM) leaders Thycotic and Centrify, announced new research that reveals more than...
Threat Intelligence has become a bucket for a lot of things – from Indicators of Compromise (IOC), to malware reverse engineering, to deep and dark web...
The Department of Homeland Security (DHS) will issue a directive later this week requiring all pipeline companies to report cybersecurity incidents to federal authorities. The directive comes...
The FBI identified at least 16 Conti ransomware attacks targeting U.S. healthcare and first responder networks, including law enforcement agencies, emergency medical services, 9-1-1 dispatch centers,...
Distributed denial of service (DDOS) attacks – when an attacker attempts to make it impossible for a service to be deliverable – are increasing in size,...
In DevOps environments, new cloud applications and feature delivery happen in real time. Unfortunately, so do cloud exploits, where threat actors are increasingly exploiting privileged access...
Recent Comments