Advertisement
-
INSIDER
-
Defending quantum-based data with quantum-level security: a UK trial looks to
-
9 top identity and access management tools
-
-
News
-
New Deep Instinct partner program targets MSSPs fighting ransomware
-
Universal database of device vulnerability information launched
-
-
How-ToView All
-
Windows Security Tips
-
Microsoft Defender for Business | What security admins need to know
-
Reviewing software risks on your Windows network
-
Five things security pros want from CNAPP
New research reveals what practitioners believe is most important for cloud security technology.
Security startups to watch for 2022
Security startups are often innovation leaders. These are some of the most interesting ones to watch as they tackle issues around cloud security, asset management and more.
Google Cloud blocks largest HTTPS DDoS attack ever
Google says Cloud Armor protected a customer from a HTTPS DDoS attack that peaked at 46 million requests per second with links to the Mēris attack family.
Advertisement
NIST CSF 2.0 Workshop emphasizes global appeal, metrics and assessment
About 7,000 international workshop attendees heard discussions of NIST's plans for Cybersecurity Framework 2.0, which aims to offer more guidance on supply chain security, measurement, and implementation, among other topics.
New Deep Instinct partner program targets MSSPs fighting ransomware
Deep Instinct's Stratosphere program is indirectly aimed at small and medium-size businesses, which are increasingly turning toward MSSPs (managed security service providers).
Universal database of device vulnerability information launched
DeviceTotal's new repository includes security data for all devices on the market with the aim to better mitigate vulnerabilities.
Google updates Chronicle with enhanced threat detection
Google Cloud’s Chronicle will now offer curated threat detection as part of its analytics initiative in the Chronicle SecOps suite.
Ransomware safeguards for small- to medium-sized businesses
Following these 40 safeguards from the Institute for Security and Technology will help protect SMBs from ransomware and other malware attacks.
"Evil PLC Attack" weaponizes PLCs to infect engineering workstations
Researchers demonstrate a proof of concept where hijacked programmable logic controllers can compromise engineering workstations to allow lateral movement.
Advertisement
Safe Security debuts two free risk assessment tools for businesses
Organizations can gauge their cybersecurity risk factors by using Safe Security’s new online calculators.
Exposed VNC instances threatens critical infrastructure as attacks spike
Threats surrounding Virtual Network Computing laid bare as attacks targeting critical infrastructure increase.
Vulnerability eXploitability Exchange explained: How VEX makes SBOMs actionable
VEX adds context to software vulnerabilities to better inform risk assessment decisions.
The 12 biggest data breach fines, penalties, and settlements so far
Hacks and data thefts, enabled by weak security, cover-ups or avoidable mistakes have cost these companies a total of nearly $4.2 billion and counting.
3 ways China's access to TikTok data is a security risk
The security community weighs in on real-world scenarios in which China or other nations could operationalize data collected by online platforms and how to mitigate the risk.
From Our Advertisers
-
Featured Sponsor IntelCompetitive Advantage with a Modern Data Center that Delivers Boundless Agility
-
Sponsored by NetscoutDeploy NDR to Modernize Your Cybersecurity Strategy
-
Sponsored by Hillstone NetworksSD-WAN and Cybersecurity: Two Sides of the Same Coin