The day's top cybersecurity news and in-depth coverage
June 09, 2021
Every Windows network admin can improve their security posture by focusing on these six basic areas. Read more â¶
In this episode, we look at the steps organizations are taking toward Zero Trust and provide recommendations for making the most of a Zero Trust model to reduce risk while helping employees be more productive, regardless of where they're working from.
This newly discovered malware is the first to take advantage of an obscure Windows container escape technique to seek out and infect Kubernetes clusters.
With flexibility comes confusion, misconfiguration, and exposure, researchers say.
Taking these steps will save money, time, and reputation when that next breach hits.
The successful seizure could encourage other victims to better cooperate with federal agencies and cause ransomware gangs to rethink their operations.
As two-factor authentication becomes more widespread, criminals seek novel ways to subvert it. Here's what you need to know.