What We've Learned in the 12 Months Since the Colonial Pipeline Attack The attack may have been "a major wake-up call" about the need for greater resilience in IT environments, but have security teams hit the snooze bar one too many times?
Docker Under Siege: Cybercriminals Compromise Honeypots to Ramp Up Attacks Cloud containers are increasingly part of the cybercrime playbook, with researchers flagging ongoing scanning for Docker weaknesses along with rapid exploitation to infect systems with coin-miners, denial-of-service tools, and ransomware.
LATEST FROM DR TECHNOLOGY
Post-Quantum Cryptography Set to Replace RSA, ECC In the next 10 years, public-key encryption needs to be replaced by post-quantum techniques that can stand up to the new challenges.