The threat actor behind the recent Dell data breach revealed they scraped information of 49 million customer records using an...
Technology Management
It's important to keep in mind that recovering from an attack is not the same as disaster recovery or business...
The phishing kit is also evolving, with updates to Tycoon 2FA in February said to have enhanced its capabilities by...
Throughout CSF 2.0, NIST recommendations dovetail with SaaS security needs. Govern, the new function, addresses issues relating to the democratization...
In a tabletop exercise, a team discusses their roles and responses during an emergency under different scenarios, typically with someone...
Compared to the traditional IT security model, which presumes that everything and everyone on the network is trusted, the zero-trust...
The White House Office of the National Cyber Director (ONCD), in a report released Monday, called on developers to reduce...
"The uncovered operation involves the manipulation of thousands of hijacked sub-domains belonging to or affiliated with big brands," head of...
"Based on our initial review, we believe that today's outage was caused by the application and execution of an incorrect...
As companies continue to embrace the cloud, software-as-a-service (SaaS), and remote work, the million-dollar question is, How will things shake...