Loading...
The day's top cybersecurity news and in-depth coverage
January 12, 2022
The U.S. cybersecurity agency can't rule out that adversaries are using Log4j to gain persistent access to launch attacks later. Read more â¶
The convergence of networking and security breaks down silos and centralizes data from users and the network that can be used to improve security and performance.
Elephant Beetle specializes in stealing money from financial and commerce firms over an extended period of time while remaining undetected.
Is that security trend hot or not? From tools and technologies to threats and tactics, the numbers don't lie.
You have native options to better secure Microsoft 365. Use them effectively and you might save time and money spent on other solutions.
Kyoto University lost terabytes of data in a machine-as-an-insider scenario triggered by human error. Here are questions CISOs should ask to avoid a similar situation.
Seeing opportunities in the mass move to remote work, cyberattackers are updating their tactics, compelling security leaders to respond. Experts make their predictions about threat reduction, compliance, supply chain management, security spending and more.
Hybrid cloud environments can add complexity, reduce visibility, and require different logging and monitoring approaches for security teams.
© 2024