Why Do We Respect Reading More Than Watching TV?
Everyone knows smart people read and lazy people watch TV, but aren’t they often doing the same thing? I’m reading Game of Thrones right now,…
Everyone knows smart people read and lazy people watch TV, but aren’t they often doing the same thing? I’m reading Game of Thrones right now,…
As organizations accelerate their digital transformation journeys, the Chief Information Security Officer (CISO) role has never been more pivotal or complex. The cybersecurity landscape of…
Beyond Silos By Dan Cole, VP of Product Marketing, ThreatConnect We know that attackers are outpacing defenders: we’ve all heard the cliche that “attackers only…
Why Application Security is Non-Negotiable The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak…
There’s nothing like the freedom of the open road when you’re on a motorcycle. But staying connected while you ride can be tough. Whether it’s…
Cybersecurity Ventures publishes a chart at RansomwareCost.com containing our calculations of global ransomware damage cost predictions from 2015 to 2031. For this year, 2025, we predict that…
They say you are a composite of your closest friends, and given my ambition I often grapple with a balance between seeking to surround myself…
In a sophisticated onslaught targeting the open-source ecosystem, reports have emerged detailing several malicious npm packages that are nefariously exploiting the Telegram Bot API to…
Threat actors are exploiting bulletproof hosting service Proton66 for malicious activities, including campaigns from SuperBlack ransomware operators, Android malware distribution via hacked WordPress, targeted attacks…
There are now several public proof-of-concept (PoC) exploits for a maximum-severity vulnerability in the Erlang/OTP SSH server (CVE-2025-32433) unveiled last week. “All users running an…
In what has been described as an “extremely sophisticated phishing attack,” threat actors have leveraged an uncommon approach that allowed bogus emails to be sent…
Having worked in IT for a good bit of time I have thought a lot about various information technology skillsets and which will become more…