Loading...
The day's top cybersecurity news and in-depth coverage
April 27, 2022
Many organizations still have on-premises Microsoft Exchange, SharePoint, or Office servers with inadequate protections. Read more â¶
Ready for a more proactive threat-informed defense? Find out what it takes to construct an entire attack sequence to enable defenders to map detection and mitigation actions so that you are ready if attackers target your business.
Research suggests Emotet is testing new tactics, techniques, and procedures on a small scale before adopting them in wider activity.
The Audience Hijacking Protector by Akamai is a cloud-based solution to help protect in-browser attacks including marketing fraud and other malicious redirections.
Organizations need SOC transformation for security efficacy and operational efficiency. Technology vendors should come to this yearâs RSA Conference with clear messages and plans, not industry hyperbole.
Civil lawsuits aim to show that SolarWinds and its CISO did not take adequate actions to prevent a breach. Here's how security leaders can protect themselves and their organizations from similar claims.
The Cloud Security Alliance's Software-Defined Perimeter 2.0 specification creates a path to a zero-trust approach through strong access controls.
âShared responsibilityâ usually means that no one is responsible for minding the gap. Donât fall in.
© 2024