Operationalizing Zero Trust Architecture
By Chaim Mazal, Chief Security Officer, Gigamon Over the last few years, organizations have been hearing about a Zero Trust…
By Chaim Mazal, Chief Security Officer, Gigamon Over the last few years, organizations have been hearing about a Zero Trust…
The Mallox ransomware group, also known as TargetCompany, Fargo, and Tohnichi, has become increasingly active, signaling a significant shift in…
Security Researchers warn about finding new vulnerabilities in the AMI MegaRAC Baseboard Management Controller (BMC) software. The flaws, rated from…
Multiple DDoS botnets have actively exploited a critical vulnerability discovered in Zyxel firewall models, as revealed by cybersecurity researchers. Tracked…
P2PInfect is a new cloud-targeting, peer-to-peer (P2P) worm recently discovered by cybersecurity researchers, that targets vulnerable Redis instances for follow-on…
Robert Falzon is currently the Head of Engineering, Canada, within the office of the CTO for Check Point Software Technologies…
Tampa General Hospital announced on Wednesday evening that cybercriminals breached its network and stole files containing the personal health information…
Cosmetic conglomerate Estée Lauder has been listed on the data leak sites of two of the most active threat groups…
Adobe released an emergency ColdFusion security update meant to fix critical vulnerabilities, including a new zero-day vulnerability. Adobe fixed three…
The United Kingdom’s public sector is undergoing a digital transformation, relying increasingly on technology to enhance service delivery, streamline operations,…