Source
DARKReading
SaaS security platform promises to track down shadow IT, map supply chain risk, and "nudge" employees to work securely.
Ransomware attacks are on the rise, but organizations also have access to advanced tools and technologies they can use to fight back.
From the basics to advanced techniques, here's what you should know.
The campaign uses a combination of tactics and a common JavaScript obfuscation technique to fool both end users and email security scanners to steal credentials.
Despite dozens of tools and external vendors, 2 in 3 organizations believe their data strategy isn't sustainable beyond three years, which could leave businesses vulnerable.
New open source Cloud Hunter tool, developed through Lacework Labs research, helps customers get better visibility to reduce response times for incident investigations.
Can already beleaguered CISOs now add possible legal charges to their smorgasbord of job considerations? Disclose a breach to comply and face dismissal, or cover it up and face personal punishment.
This marks the third identity and access management (IAM) company acquired by Thoma Bravo in just the past few months.
Among other things, users who download the app could end up having their WhatsApp account details stolen.
Vista Equity Partners plans take the publicly traded security-awareness training vendor private.