Source
DARKReading
Security leaders are interested in continuous authentication technologies, especially behavioral-based capabilities.
A new analysis confirms a surge in global cyberattacks since the COVID-19 pandemic began.
Researchers report that the location of its C2 server and the countries where samples were uploaded may indicate targets include Southeast Asia.
Challenges with lack of time and vulnerability and patching prioritization are putting organizations at increased risk of cyberattacks.
CISA reports it's seeing ongoing scanning for the flaws and expects the activity to accelerate.
New microprocessor technologies like secure enclaves and cryptography acceleration enable hardware to better safeguard medical devices.
Continuous monitoring of network traffic, data loss prevention, and responsive self-healing protection from threats to cloud-native applications.
HP aims to let admins secure work-from-home endpoints by extending cloud security management that can remotely track, detect and self-heal remote company devices -- including printers.
A wealth of Microsoft data highlights trends in nation-state activity, hybrid workforce security, disinformation, and supply chain, IoT, and OT security.
The last thing you want is a vendor that lies to you about its security practices.