The role of cybersecurity has never been more prevalent than it is today. Safeguarding controlled government and military data from unauthorized disclosure is not only critical...
Because cybersecurity events are complicated, we rely on analogies to understand how they work. Analogies are useful, but certain oversimplifications are perpetuating inaccurate narratives. These inaccuracies...
REvil ransomware gang’s website and infrastructure has gone offline, about a week and a half after the news of the group’s cyberattack on IT software vendor...
Through the course of collaboration with trusted third parties, SonicWall has been made aware of threat actors actively targeting Secure Mobile Access (SMA) 100 series and...
Scarcity creates opportunity – and you’d be hard-pressed to find a sector more abundant in both than cybersecurity. In fact, according to PwC, 3.5 million security positions...
Salt Labs researchers investigated a large financial institution’s online platform that provides API services to thousands of partner banks and financial advisors. As a result of...
How often do you consider gravity? And the power of this invisible force to move oceans, hold planets in orbit, and quite literally, keep us all...
I dare to say this: “companies need to stop playing the game of pin the blame on the developer whenever a security vulnerability is discovered or...
Fashion retailer Guess recently announced a data breach that compromised 1,300 people and their information, including account numbers, debit and credit card numbers, social security numbers, access codes...
Digital Shadows published new research revealing that in the last four months, each of its clients experienced on average 360 domains impersonating their company and brand name –...
Recent Comments