Don’t Forget to Report a Breach: A Cautionary Tale
Responding to an incident quickly is important, but it shouldn't come at the expense of reporting it to the appropriate…
Responding to an incident quickly is important, but it shouldn't come at the expense of reporting it to the appropriate…
Security researchers have shed more light on the cryptocurrency mining operation conducted by the 8220 Gang by exploiting known security…
The modern kill chain is eluding enterprises because they aren’t protecting the infrastructure of modern business: SaaS. SaaS continues to…
Sony is pushing its mini-LED TVs hard, harder than one might expect when it has its Bravia 8 OLED TV…
In recent times, there’s been a huge buzz about the increasing popularity of Continuous Threat and Exposure Management (CTEM). With…
In the 5th Avenue Lego store in Manhattan, in the back toward the stairs going to the second level, there’s…
In today’s world, trust is not taken for granted. Similarly, imagine a security model that questions every interaction, ensuring nothing…
Life on Earth is unforgiving, as any nature documentary will tell you. But sometimes, the constant battle to survive is…
In this episode of “Story behind a cyberattack”, let’s talk about a cyberattack that shook the cybersecurity landscape in 2021.…
Longtime NSA-watcher James Bamford has a long article on the reauthorization of Section 702 of the Foreign Intelligence Surveillance Act…