The vulnerability gives attackers a way in through the internet, but that’s not the whole extent of the risk.
Manual penetration testing is quickly becoming obsolete, with AI-powered tools offering a way to cover the bases.
New regulations like GDPR and CCPA can have a positive effect on security, but they can also get in the way of developing smart security tools.
Old data may not be of much value to a business, but it can command top bitcoin on the dark web.
The vulnerability is a reminder that apps on your employee’s phones represent a huge attack surface for your enterprise network.
Experts warn that BlueKeep attacks are on their way, and at least a million machines are vulnerable.
Recent studies and surveys indicate that improperly configured public cloud instances continue to turn sensitive data into low hanging fruit.
As more data center managers move to private, public, and hybrid cloud infrastructures, new security challenges emerge, but clouds also offer new technologies to help meet security challenges.
Here are the most common types of attack that bring down data centers.
In the AI-fueled security wars, most of the arsenal is currently in the hands of the good guys, but the balance of power might soon change.
Micro-segmentation company Guardicore raised $60 million this week, but it’s not alone.
Experts say exploits would be sophisticated and take a long time to build, but operators should act now.
Next-gen SIEM providers eyeing incumbents with new tech features, modern takes on pricing
Ransomware remains the dominant form of cyberattack and phishing attacks now have more impact, despite more awareness.
Attackers are smarter and attacks are more powerful, but so are the tools used to fight them.