6 Steps to Accelerate Cybersecurity Incident Response
Modern security tools continue to improve in their ability to defend organizations’ networks and endpoints against cybercriminals. But the bad…
Modern security tools continue to improve in their ability to defend organizations’ networks and endpoints against cybercriminals. But the bad…
EXECUTIVE SUMMARY: Nearly 75% of CEOs are concerned about their organizations’ abilities to avert or mitigate a cyber incident. It’s…
…and introducing Sophos X-Ops’ new video channel, which provides viewers (and readers too) with a little something extra
Managing privileged access to internal resources is a challenge for organizations worldwide. If left unaddressed, it could lead to data…
Kaspersky researchers are warning of multiple WhatsApp mods that embed a spyware module dubbed CanesSpy. Kaspersky researchers discovered multiple WhatsApp…
Meet Jeff. He’s the CISO of a mid-sized financial services company – and it’s his job to keep the organization…
Any device that runs code is vulnerable to hacking and so are MacOS machines. They need patching just as any…
The FSB arrested two Russian hackers who are accused of having helped Ukrainian entities carry out cyberattacks on critical infrastructure…
Another example of a large and influential state doing things the federal government won’t: Boards of directors, or other senior…
Iran-linked cyberespionage group MuddyWater is targeting Israeli entities in a new spear-phishing campaign. Iran-linked APT group MuddyWater (aka SeedWorm, TEMP.Zagros,…