The day's top cybersecurity news and in-depth coverage
June 03, 2020
Breach concerns, data privacy regulations and new responsibilities for managing risk are elevating the security leadership role. Read more â¶
Learn why on-demand simulation-based cybersecurity training is essential for security teams in todayâs threat environment.
If left unpatched, these SAP ASE vulnerabilities could give attackers full control of databases and servers.
Some organizations have still not implemented an Office patch from 2012. Attackers know this and are exploiting the vulnerability.
Sysmon and the cloud-based Sentinel log events to help detect when and how attackers compromised your network.
Left unpatched, this command injection flaw could allow attackers to take control of a virtualized cloud infrastructure.
Join Zones and our strategic partner, Cisco, to learn how to confidently secure every business endeavor with an open, integrated platform that scales to meet your security needs.
Organizations that want to concentrate on finding and removing threats using advanced techniques like user and device analytics would find a perfect match in the Securonix SIEM.
Zoom, Microsoft Teams, Google Duo, Cisco Webex, FaceTime, Jitsi, Signal and WhatsApp. What does their encryption look like? What are the trade-offs?
Expand your skills, know-how and career horizons with these highly respected cybersecurity certifications.