While authentication and authorization might sound similar, they are two distinct security processes in the identity and access management (IAM) space. Authentication is the security practice...
The FBI identified at least 16 Conti ransomware attacks targeting U.S. healthcare and first responder networks, including law enforcement agencies, emergency medical services, 9-1-1 dispatch centers,...
The increase in cyber insurance adoption and premium prices coincides with a changing — and more challenging — threat landscape, this according to a new GAO report on...
Nuspire, managed security services provider (MSSP), announced the appointment of industry veteran, J.R. Cunningham, as Chief Security Officer. In this role, Cunningham will oversee Nuspire’s security...
Palo Alto Cortex Xpanse research team spent the first three months of 2021 monitoring the activities of attackers to better understand how much of an edge adversaries...
In the aftermath of the Colonial Pipeline attack, global IT association and learning community ISACA polled more than 1,200 members in the United States and found...
The vaccine rollout is ushering in a return to the office as many businesses adopt hybrid working models and embrace flexible workspaces. For some employers, COVID-19 has permanently...
Distributed denial of service (DDOS) attacks – when an attacker attempts to make it impossible for a service to be deliverable – are increasing in size,...
Researchers at Check Point Research analyzing Android apps have discovered serious cloud misconfigurations leading to the potential exposure of data belonging to more than 100 million...
In DevOps environments, new cloud applications and feature delivery happen in real time. Unfortunately, so do cloud exploits, where threat actors are increasingly exploiting privileged access...
Recent Comments