Achieving Optimal Zero Trust Maturity: The Role of Data and Governance
By Carolyn Duby, Chief Technology Officer, Cloudera Government Solutions The federal government has placed a stronger emphasis on zero trust since OMB’s federal zero trust…
By Carolyn Duby, Chief Technology Officer, Cloudera Government Solutions The federal government has placed a stronger emphasis on zero trust since OMB’s federal zero trust…
Security Affairs newsletter Round 441 by Pierluigi Paganini – INTERNATIONAL EDITION Pierluigi Paganini October 15, 2023 A new round of the weekly SecurityAffairs newsletter arrived!…
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Turning military veterans into cybersecurity expertsIn this Help Net Security…
Lockbit ransomware gang demanded an 80 million ransom to CDW Pierluigi Paganini October 14, 2023 The Lockbit ransomware gang claims to have hacked the technology…
Believe it or not, the internet is now over half a century old. Of course, it has really come in leaps and bounds in the…
Personal information of around 8,000 global employees, which was exposed in an alleged Decathlon data breach two years ago, has been shared on the dark…
In 2004, the digital landscape would be almost unrecognisable compared to the technologies we enjoy now. With this month marking the 20th anniversary of Cybersecurity…
CISA warns of vulnerabilities and misconfigurations exploited in ransomware attacks Pierluigi Paganini October 14, 2023 CISA warns organizations of vulnerabilities and misconfigurations that are known…
We explain what quishing is and provide information about some current quishing campaigns. Quishing is phishing using QR (Quick Response) codes. QR codes are basically two-dimensional…
By Sean Malone, Chief Information Security Officer, Demandbase Technology has given rise to many comparisons in the past few years, but the train comparison is…
By Gizem Yılmaz, Product Owner, Nextray AI In the modern digital era, the significance of cyber security has escalated. With the growing dependence of businesses…
Over the past several months, we’ve taken a journey through the new 2023 OWASP API Security Top-10 list. In the previous 12 weekly posts, we’ve…