BrandPost: Resolving the Data Protection Challenge Across Cloud and Remote Devices News By David Richardson, Vice President of Product at Lookout As… rooter February 16, 2023 1 min read 0
5 biggest risks of using third-party services providers News As business processes become more complex, companies are turning to… rooter February 16, 2023 1 min read 0
Cybersecurity startup Oligo debuts with new application security tech News Israel-based startup Oligo Security is exiting stealth mode with the… rooter February 16, 2023 1 min read 0
China-based cyberespionage actor seen targeting South America News China-based cyberespionage actor DEV-0147 has been observed compromising diplomatic targets… rooter February 16, 2023 1 min read 0
Plan now to avoid a communications failure after a cyberattack News Responses to recent cyber breaches suggest organizations can struggle to… rooter February 16, 2023 1 min read 0
Hackers attack Israel’s Technion university, demand over $1.7 million in ransom News Israel’s Technion university on Sunday suffered a ransomware attack, which has… rooter February 16, 2023 1 min read 0
PLC vulnerabilities can enable deep lateral movement inside OT networks News Threat groups who target operational technology (OT) networks have so… rooter February 16, 2023 1 min read 0
Measuring cybersecurity: The what, why, and how News A core pillar of a mature cyber risk program is… rooter February 16, 2023 1 min read 0
Cohesity Data Cloud 7.0 enhances privileged access authentication, ransomware recovery News Data security and management vendor has announced the 7.0 software… rooter February 16, 2023 1 min read 0
Expel announces MDR for Kubernetes with MITRE ATT&CK framework alignment News Security operations provider Expel has announced the general availability of… rooter February 16, 2023 1 min read 0