The news is flooded with updates regarding the COVID-19 vaccine. Cyberattacks are targeting the vaccine supply chain. Phishing attacks are exploiting sign-ups for the vaccine. There are even attacks to get access to vaccine data. Sounds a lot like our enterprises every day! ...
The news is flooded with updates regarding the COVID-19 vaccine. Cyberattacks are targeting the vaccine supply chain. Phishing attacks are exploiting sign-ups for the vaccine. There are ...
The growth of application development, DevOps, containers, and cloud has fueled the growth of application security tools. We now have static analysis, software composition analysis, ...
A zero-trust security architecture makes increasing sense in a world of remote work.
This guide is meant to provide a foundation for decision makers and employees on the cybersecurity issues surrounding the platforms we use and the products we make.
While some IoT security trends in 2021 will continue trends from 2019 and 2020, COVID-19 has brought some new threats to the fore.
Cyberattacks have grown in sophistication and volume in 2020. Here is a list of 10 threats you should be aware of for 2021.
By Torsten George, cybersecurity evangelist, Centrify Phishing is one of the oldest tricks in a hacker’s playbook. The tactic can lure any employee from blissfully going about their ...
Fortinet conducted a survey and outlined eight areas of focus that explore the challenges organizations faced as a result of the shift in remote work, and how organizations will secure ...
CrowdStrike has joined forces with Netskope, Okta and Proofpoint to protect today’s dynamic and remote working environments at scale.
Nearly 60% of small businesses have experienced a data breach, and the stakes are high. Here are tips to stay prepared.
While branding, marketing campaigns, and product quality will be at the forefront of your mind, don't overlook cybersecurity.
Edge computing security concerns prevent a lot of businesses from moving to the edge. But experts say that, with some planning and forethought, enterprises can plug security holes and reap ...
While remote work can be an exciting opportunity, it comes with cybersecurity risks. Here's how to prevent cyberattacks on remote employees.
Written by Safi Raza, Director of Cybersecurity, Fusion Risk Management. The recent confrontation between the U.S. and Iran not only posed the risk of military conflict, but of cyber ...
Hot topics of conversation around European Cyber Security Month (ECSM) included the challenges and opportunities of cybersecurity, the blurred line between the good guys and bad actors, and ...
Where does your organization sit regarding a cyberattack or data breach? Are you well-prepared?
The Australian Cyber Security Centre (ACSC) releases Mailto ransomware advisory with guidance that may assist managed security service providers (MSSPs) worldwide.
If you’re a small business or a company without dedicated IT resources, these statistics may be the wake-up call you need.
Computer security training, certification and free resources. We specialize in computer/network security, digital forensics, application security and IT audit.