Loading...
The day's top cybersecurity news and in-depth coverage
January 14, 2021
The XDR market is hot, with vendors large and small jumping on the bandwagon. Here are 5 key capabilities to look for when evaluating XDR solutions. Read more â¶
In this ebook, Duo can help examine the zero-trust security model and dig into five key steps to move your organization beyond the perimeter and base application access on user identity and the trustworthiness of devices.
Trojan malware comes in many different types, but all require a user action to initiate.
Government and private organizations, including Microsoft, have released a wealth of information and tools to assess risk from SolarWinds-like attacks.
US bulk energy providers must now report attempted breaches as well as successful breaches. Guidance is murky over what constitutes an "attempted" breach.
Hashing is a cryptographic process that makes it harder for attackers to decrypt stored passwords, if used correctly.
OSINT (open source intelligence) is the practice of collecting information from published or otherwise publicly available sources. These tools will help you find sensitive public info before bad guys do.
© 2024