Advertisement
Sensitive data in the cloud gets new automated remediation tool from BigID
An automated watchdog designed to keep private files in cloud storage secure is now available for Google Drive users, from data intelligence and management company BigID.
Microsoft urges Windows users to run patch for DogWalk zero-day exploit
Despite previously claiming the DogWalk vulnerability did not constitute a security issue, Microsoft has now released a patch to stop attackers from actively exploiting the vulnerability.
CrowdStrike adds AI-powered indicators of attack to Falcon platform
The new feature leverages millions of examples of malicious activity to more accurately identify signs of an attack.
Advertisement
Chinese APT group uses multiple backdoors in attacks on military and research organizations
The TA428 group has been successful by targeting known vulnerabilities and using known detection evasion techniques.
OPSWAT launches new malware analysis capabilities for ICS, OT networks
Critical infrastructure cybersecurity vendor enhances its MetaDefender Malware Analyzer platform to map malware to the MITRE ATT&CK Industrial Control Systems framework.
U.S. Federal Court breach reveals IT and security maturation issues
An investigation into the 2020 breach results in 18 recommendations for the Administrative Office of the U.S. Courts to change its IT and security policies and practices.
How harm reduction can more effectively reduce employee risky behavior
Black Hat speaker proposes framework to reduce the negative consequences of risky user actions and encourage them to follow security's advice.
8 tips to secure printers on your network
Printers are essentially computers attached to your network and should be protected accordingly. Here's how.
7 best reasons to be a CISO
The role of the CISO has its challenges, but these positives are what people in the role say make it all worthwhile.
How OKRs keep security programs on track
This goal-setting framework can help security teams stay focused on priorities, but success requires a commitment to implementing supporting practices.
Advertisement
Ransomware, email compromise are top security threats, but deepfakes increase
While ransomware and business email compromise are leading causes of cybersecurity threats, geopolitics and deepfakes play an increasing role, according to reports from VMware and Palo Alto.
SBOM formats SPDX and CycloneDX compared
Understanding the differences between these widely used software bill of materials format standards is important, but your tools will likely need to support both.
AWS, Google Cloud, and Azure: How their security features compare
Each cloud platform differs in the security tools and features it offers customers to help them protect their cloud assets.
Top cybersecurity M&A deals for 2022
The hot cybersecurity mergers and acquisition market continues into 2022 as vendors look to solidify their positions and expand their offerings.
Palo Alto debuts Unit 42 team for managed detection and response
Live expert service builds on Palo Alto’s Cortex extended detection and response (XDR) platform provide, offering a managed detection and response (MDR) team for more personalized cybersecurity management and incident response.
From Our Advertisers
-
Featured Sponsor HP Wolf SecurityThe Need for Endpoint Security Rooted In Zero Trust
-
Sponsored by Microsoft SecurityIs MFA the Vegetable of Cybersecurity?
-
Sponsored by ZscalerChoosing the Right Security Service Edge Platform
-
Sponsored by PresageTransforming Digital Healthcare Through Video Vital Sign Analysis