Advertisement

1887170134 attack surface programming abstract

9 attack surface discovery and management tools

The main goal of cyber asset attack surface management tools is to protect information about a company’s security measures from attackers. Here are 9 tools to consider when deciding what is best for the business.


Two developers collaborate on a project as they review code on a display in their workspace.

ForgeRock, Secret Double Octopus offer passwordless authentication for enterprises

ForgeRock is adding Enterprise Connect Passwordless to its Identity Platform to provide no-code and low-code approaches for enterprises to add passwordless authentication to their IT infrastructure.


A magnifying lens exposes an exploit amid binary code.

CISA kicks off ransomware vulnerability pilot to help spot ransomware-exploitable flaws

The CISA pilot program will notify organizations of vulnerabilities that can lead to ransomware attacks, with small organizations the primary beneficiaries.


Advertisement

Ransomware

BianLian ransomware group shifts focus to extortion

The shift in the operating model comes as a result of Avast’s release of a decryption tool that allowed a victim of the BianLian ransomware gang to decrypt and recover their files without paying the ransom.


email popup warning window phishing cybersecurity security

7 guidelines for identifying and mitigating AI-enabled phishing campaigns

Phishing has always been a thorn in the side of enterprise cybersecurity, and recent AI developments such as ChatGPT are making things even worse. Here are some guidelines for dealing with the increasingly sophisticated phishing...


hand at keyboard with Windows logo

Two Patch Tuesday flaws you should fix right now

Vulnerabilities affecting both Outlook for Windows and Microsoft SmartScreen were patched recently — both could have wide-ranging impact.


iot security startups hot highlights planets rocket lock security

Cybersecurity startups to watch for in 2023

These startups are jumping in where most established security vendors have yet to go.


tiktok logo small

UK bans TikTok on government devices over data security fears

The UK has joined international partners in banning social media app TikTok from government electronic devices over concerns the Chinese-owned app could pose a security risk.


traders stock securities security office charts data analyses investing

When and how to report a breach to the SEC

Publicly traded companies will have to make decisions and prepare for the reporting of cybersecurity breaches to the Securities and Exchange Commission when new requirements are enacted.


shutterstock 1858812901 red team cyberspace red background

Why red team exercises for AI should be on a CISO's radar

As AI increasingly becomes part of systems under development, CISOs need to start considering the cyber risks that may originate from such systems and treat it like any traditional application, including running red team exercises.


Advertisement

south asia from space night india shutterstock 1840428529

Russian hacktivist group targets India’s health ministry

The Phoenix group claims to have access to all hospital systems in India and information on hospital employees and chief physicians.


dell

Dell beefs up security portfolio with new threat detection and recovery tools

Dell Technologies has added improved MDR capabilities, cloud-based component verification, and a new cyber recovery solution along with a partnered threat management offering.


The shadow of hand unsettlingly hovers over a keyboard.

Cybercriminals target SVB customers with BEC and cryptocurrency scams

Security researchers have found that threat actors have already registered domains and pages to carry out the attacks.


change management in digital transformation internet of things iot and new technology big data and

Palo Alto Networks announces new SD-WAN features for IoT security, compliance support

Palo Alto Networks is introducing advanced URL filtering to help prevent unknown and evasive man-in-the-middle (MitM) and SaaS platform phishing attacks.


Conceptual image of a network labeled 'Zero Trust.'

Beyond Identity launches Zero Trust Authentication to align verification with zero-trust principles

Zero Trust Authentication is designed to negate the shortcomings of traditional authentication methods with features including passwordless capability and phishing resistance.