What's Anonymous Up to Now? The hacker group recently took credit for two high-profile incidents -- but its actions aren't quite the same as they once were, some say.
How Advanced Attackers Take Aim at Office 365 Researchers discuss how adversaries use components of Office 365 that are poorly understood and not closely monitored.
Applying the 80-20 Rule to Cybersecurity How security teams can achieve 80% of the benefit for 20% of the work.