The day's top cybersecurity news and in-depth coverage
January 31, 2022
What are the top security priorities for the year ahead? Hereâs what CISOs across industries say are their main objectives. Read more â¶
ExtraHop threat researchers have observed attackers in the wild using encrypted traffic to avoid detection of Log4Shell attacks. This is consistent with the general trend of cyberattackers using encryption as an evasion mechanism to avoid detection during both the initial intrusion and lateral movement stages of an attack, among others.
A password manager stores a userâs passwords and logins for various sites and apps and generates new, strong passwords, making it a valuable tool for implementing strong passwords in your business.
NIST's CSF, used with other guidance, can help map risk to actual threats and better comply with security mandates such as the U.S.'s cybersecurity executive order.
You have native options to better secure Microsoft 365. Use them effectively and you might save time and money spent on other solutions.
Security teams trying to defend their organizations need to adapt quickly to new challenges. Yesterdayâs buzzwords and best practices have become todayâs myths.
These Active Directory updates address critical privilege bypass and elevation vulnerabilities. Implement them now if you can.
Hacks and data thefts, enabled by weak security, cover-ups or avoidable mistakes have cost these companies a total of nearly $1.3 billion and counting.