Two strategies to protect your business from the next large-scale tech failure
The CrowdStrike event in July clearly demonstrated the risks of allowing a software vendor deep access to network infrastructure. It...
Read more →The CrowdStrike event in July clearly demonstrated the risks of allowing a software vendor deep access to network infrastructure. It...
Read more →Nuclei is a fast and customizable open-source vulnerability scanner powered by YAML-based templates. With its flexible templating system, Nuclei can...
Read more →Fastly found 91% of cyberattacks – up from 69% in 2023 – targeted multiple customers using mass scanning techniques to...
Read more →GenAI adoption has reached a critical phase, with 67% of respondents reporting their organization is increasing its investment in GenAI...
Read more →Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: PostgreSQL databases under attackPoorly protected...
Read more →A week after SolarWinds released a fix for a critical code-injection-to-RCE vulnerability (CVE-2024-28986) in Web Help Desk (WHD), another patch...
Read more →After peaking in late 2023, the ransomware industry is beginning to stabilize in productivity, with notable developments in ransomware targets,...
Read more →To date, most technology solutions focused on vulnerability management have focused on the prioritization of risks. That usually took the...
Read more →In the first six months of 2024, Hiya flagged nearly 20 billion calls as suspected spam – more than 107...
Read more →Here’s a look at the most interesting products from the past week, featuring releases from Entrust, Fortanix, McAfee, Own, RightCrowd,...
Read more →QNAP has released the QTS 5.2 NAS operating system. A standout feature of this release is the debut of Security...
Read more →Wallarm announced its latest innovation: API Attack Surface Management (AASM). This agentless technology transforms how organizations identify, analyze, and secure...
Read more →