The flourishing market for initial access to companies' networks highlights how cybercriminal groups continue to specialize in particular stages of the attack-chain pipeline.
Despite being the frequent target of nation-state and criminal actors, nearly every US government agency gets a "C" or "D" for data security, according to a new Senate report.
In his keynote address at Black Hat USA on Wednesday, Matt Tait, chief operating officer at Corellium, called for software platform vendors and security researchers to do their part to thwart the fallout of software supply chain compromises.
At the inaugural Omdia Analyst Summit, experts discuss where the past year has created gaps in traditional security strategy and how organizations can fill them.
The Department of Justice believes that banning ransom payments will cause greater havoc. However, the agency has called for incident reporting to be required.
The fellowship, created in honor of Human's co-founder and chief scientist Dan Kaminsky, will be awarded to someone "who epitomizes benevolent internet innovation."
In this webinar, we'll look at how one Fortune 100 organization transformed its security program by investing in external threat hunting, establishing a world class threat reconnaissance program that now has proven ROI. With no-touch monitoring of its third parties' networks, ...
Over the past few years, many enterprises have been improving cybersecurity by implementing the Security Orchestration, Automation, and Response (SOAR) framework, which provides a path to collect threat data from multiple sources and respond to some security events automatically. How ...
Keep This Newsletter Out Of Your SPAM Folder Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.