White House cyber security strategy shifts burden to providers
EXECUTIVE SUMMARY: On Thursday, the White House released an ambitious and wide-ranging cyber security plan that calls for stronger security […]
EXECUTIVE SUMMARY: On Thursday, the White House released an ambitious and wide-ranging cyber security plan that calls for stronger security […]
A scanning attack is a method used by threat actors to identify vulnerabilities in a network or system. Scanning attacks
In this post, I will show you the biggest challenges and opportunities facing tech businesses right now. As a business
Earlier this year, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) released an advisory regarding the Royal Ransomware gang. The
In this post, I will show you the advantages and limitations of Object Storage. The majority of today’s communications data
This year, the Chinese cyberespionage group Mustang Panda began deploying a new custom backdoor named ‘MQsTTang’ in attacks. This advanced
Threat actors breached WH Smith, the 1,700 locations UK retailer, and exposed data belonging to current and former employees. WH
By George Mack, Content Marketing Manager, Check Point. Phishing threats have been making waves in the threat landscape, as they
This June, NIST PSCR is partnering with the First Responder Network Authority to host 5×5: The Public Safety Innovation Summit.
By Isla Sibanda, an ethical hacker and cyber security specialist based out of Pretoria. For over twelve years, she’s worked