The volume of traffic harnessed by attackers has grown steadily over the years, with distributed denial-of-service attacks regularly topping hundreds of gigabytes per second.
Researchers discovered that a data-science feature on Azure allowed anyone to retrieve the credentials of other companies using that feature, potentially exposing billions of records.
The rising trend of hacktivism, while generally well-intentioned, can have serious repercussions for your organization. Rather than allowing hacktivists to expose your company's weak spots, security pros must be vigilant in mitigating threats.
With the rise of hybrid-cloud and multicloud systems, a comprehensive strategy is needed to maintain control over who can and cannot access sensitive data across the organization, and to protect personal information.
As if fighting against cyberattacks weren't hard enough, security teams also have to contend with other issues that prevent them from doing their jobs effectively.
Recent attacks have highlighted the need for organizations to pay closer attention to the hardware, software, and networks used in software development.
From business processes to buying mechanisms and implementation timelines, a host of issues may stand in the way of flexible planning for cyber defense.
Security Pro File: After stints as an industry analyst and security executive for different companies, Chenxi Wang is developing the next-generation of security companies and women executives in security.
In this webinar, learn expert tips on how to improve your processes and use orchestration to relieve security alert fatigue, get the most out of your security investments and improve your cyber incident response.
In this webinar, experts discuss potential vulnerabilities in the new supply chain, and potential threats from online attackers. They also discuss the impact of these changes on compliance with industry and regulatory rules that govern the supply chain. You'll learn ...
As the COVID-19 pandemic eases, IT security threats and the challenges involved in responding to them are trending upward. Security leaders expect that cyberattacks like ransomware, phishing, and malware will increase even as the pandemic eventually recedes. Download the Dark ...
Keep This Newsletter Out Of Your SPAM Folder Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.