The day's top cybersecurity news and in-depth coverage
September 15, 2020
Hackers use open source intelligence to find information that will help them compromise systems. Using these tools will tell you how much of that info is exposed. Read more â¶
With the election less than two months away, government and election officials say voting itself is more secure, but Russian disinformation remains largely unaddressed.
One of the most significant results of the upheaval brought about by the response to the COVID -19 pandemic has been explosion in people working from remote locations.
Savvy security chiefs are generating returns for their organizations beyond enabling secure business operations. Here's how they do it.
Learn how code-signing attacks work and how to defend against them. It starts with patching.
Considering how much is at stake in terms of data and infrastructure exposure, companies looking to take advantage of edge computingâs promise will need to take steps to mitigate the risks.
Find out how you can continuously shrink your attack surface, act on critical threats and stay "in the KNOW" as threats evolve - in a fraction of the time you spend now
Understanding the different types of hackers, what motivates them, and the malware they use can help you identify the attacks you are most likely to face and how to properly defend yourself and your organization.