Today’s cybersecurity landscape is evolving rapidly, and new threats are growing in volume and sophistication every year. In fact, according to IDC, over half of the more...
WhiteHat Security released AppSec Stats Flash Vol. 4, the latest installment of the company’s monthly report and podcast reflecting on the current state of application security and the wider...
After seven years of malicious activity, law enforcement have managed to seize the infrastructure of the notorious malware variant “Emotet,” and have scheduled a mass uninstallation...
Device Centric Risk Management (DCRM) is a layered approach to cybersecurity that protects each device, driving remediation and mitigation directly on medical and IoT assets. To find out...
JupiterOne, provider of cyber asset management and governance solutions, announced the hiring of Sounil Yu as Chief Information Security Officer, and the appointment of Latha Maripuri...
In March, President Biden allocated 9 billion dollars in his American Rescue Plan Act of 2021 to upgrade technology and boost talents hiring in cybersecurity. Where would that...
Mandiant is currently tracking 12 malware families associated with the exploitation of Pulse Secure VPN devices. These families are related to the circumvention of authentication and backdoor access...
Employee personal data has long been recognized as a vulnerable threat vector for modern enterprise cybersecurity. However, even though more employees than ever avail themselves of identity theft and credit...
Through observation and analysis of open source information and behavior on multiple closed forums, Intel 471 found actors adopting the use of legitimate big data technology for...
Hiscox reveals that U.S. businesses’ cybersecurity spending is on the rise and they are leaders in cyber expertise, but still have more work to do when...
Recent Comments