The No Good, Very Bad Week for Iran's Nation-State Hacking Ops A look at the state of Iran's cyber operations as the US puts the squeeze on it with a pile of indictments and sanctions.
Cloud Misconfiguration Mishaps Businesses Must Watch Cloud security experts explain which misconfigurations are most common and highlight other areas of the cloud likely to threaten businesses.
GitHub Tool Spots Security Vulnerabilities in Code Scanner, which just became generally available, lets developers spot problems before code gets into production.
A Guide to the NIST Cybersecurity Framework With cybersecurity threats growing exponentially, it has never been more important to put together an efficient cyber-risk management policy, and NIST's framework can help.
Attacker Dwell Time: Ransomware's Most Important Metric How to bolster security defenses by zeroing in on the length of time an interloper remains undetected inside your network.
COVID-19 Creates Opening for OT Security Reform Operations technology was once considered low risk, at least until the virus came along and re-arranged the threat landscape.
Phishing Attack Targets Microsoft 365 Users With Netflix & Amazon Lures Cyberattacker TA2552 primarily targets Spanish speakers with messages that leverage a narrow range of themes and popular brands.