Always reach for defense in depth with proposed security changes. Measure and test results, focus on items of greatest impact, and get C-suite members involved to drive better outcomes.Read More HERE
Apple adds API that will enable sharing of passkeys across platforms, and Google offers passkey authentication in beta for Google Workspace and Google Cloud.Read More HERE
In the latest Verizon “Data Breach Investigations Report,” denial-of-service attacks are the most common type of security incident, but when it comes to breaches, nearly four-in-ten attackers compromise systems.Read More HERE
In a rare mix of motivations, the cyberattack group has been linked to both financial cybercrime and political spying efforts on governments.Read More HERE
It’s not enough to know how to better protect the enterprise — you have to be able to convince decision-makers that your plans are necessary.Read More HERE
Over that time, the group carried multiple tests to see if the exploit worked and to identify potential victims. It was like “turning the doorknob” to check for access, a researcher says.Read More HERE
Women of color are being offered a scholarship opportunity in South Africa — the offer will cover costs for pursuing a cyber career and encourage greater diversity of those studying cybersecurity courses.Read More HERE
A solid, dependable SOC strategy that is scalable in the face of various security threats is essential to reduce cybersecurity risks to your business.Read More HERE
Security teams should be empowered with the right amount of intelligence to track new and emerging threats and connect that intel to historical data.Read More HERE