Loading...
The day's top cybersecurity news and in-depth coverage
September 16, 2020
Mesh VPNs use a peer-to-peer architecture where every node or peer in the network can connect directly to any other peer without going through a central concentrator or gateway. This approach can be less expensive and easier to scale than a traditional VPN. Read more â¶
Microsoft has made it harder for attackers to redirect email responses or leverage malicious attachments. Here's how to review the impact these new features will have on your business.
Watch our CISO, Brandon Hoffman, talk about the need for contextual threat and attack surface intelligence, skill gaps in cybersecurity, and our human-plus-machine approach to tackling modern digital threats to brands today with Chuck Harold of SecurityGuyTV.com during this year's live, virtual Black Hat.
OSINT (open source intelligence) is the practice of collecting information from published or otherwise publicly available sources. These tools will help you find sensitive public info before bad guys do.
Yes, the cloud offers many security advantages over on-premises, especially for smaller organizations, but only if you avoid these mistakes around cloud configuration, monitoring and patching.
Learn how code-signing attacks work and how to defend against them. It starts with patching.
As more employees work from home, attackers have more endpoints to target. These unpatched vulnerabilities in remote access tools and Windows makes their job easier.
© 2024