Source
Threatpost
How to use zero-trust architecture effectively in today's modern cloud-dependent infrastructures.
Nate Warfield, CTO at Prevailion, discusses the dangers of focusing on zero-day security vulnerabilities, and how security teams are being distracted from the day-to-day work that prevents most breaches.
A full 89 percent of organizations experienced one or more successful email breaches during the previous 12 months, translating into big-time costs.
Last year, Google Project Zero tracked a record 58 exploited-in-the-wild zero-day security holes.
Exploring what's next for public-cloud security, including top risks and how to implement better risk management.
Citizen Lab uncovers multi-year campaign targeting autonomous region of Spain, called Catalonia.
In this time of unprecedented cyberwar, organizations must protect the personal digital lives of their executives in order to reduce the company’s risk of direct or collateral damage.
Fortinet's Derek Manky discusses the exponential increase in the speed that attackers weaponize fresh vulnerabilities, where botnets and offensive automation fit in, and the ramifications for security teams.
Connections that show the cybercriminal teams are working together signal shifts in their respective tactics and an expansion of opportunities to target victims.
Threat actors have developed custom modules to compromise various ICS devices as well as Windows workstations that pose an imminent threat, particularly to energy providers.