Scattered Spider Casino Hackers Evade Arrest in Plain Sight The feds seem to know all about the hacking group brazenly breaking into corporate networks; so why are enterprise teams left on their own to stop their cybercrimes?
Exploited Vulnerabilities Can Take Months to Make KEV List The Known Exploited Vulnerabilities (KEV) catalog is a high-quality source of information on software flaws being exploited in the wild, but updates are often delayed, so companies need other sources of threat intelligence.
LATEST FROM DR TECHNOLOGY
Cybersecurity Investment Involves More Than Just Technology Organizations are also looking at threat intelligence, risk assessment, cyber insurance, and third-party risk management.
Saudi Arabia Arms Public Sector With Google Cloud Services Chronicle CyberShield will be offered as a managed service with security monitoring and Mandiant incident response included.