How should SMBs navigate the phishing minefield?
In this Help Net Security interview, Pete Hoff, CISO at Wursta, offers advice to SMB security leaders and professionals on...
Read more →In this Help Net Security interview, Pete Hoff, CISO at Wursta, offers advice to SMB security leaders and professionals on...
Read more →“I didn’t really have a choice,” says Ben Bernstein, the former CEO and co-founder of Twistlock (acquired by Palo Alto...
Read more →Threat actors continued to exploit technical misconfigurations through various fraud schemes, according to a new report from Visa. These include...
Read more →Organizations are optimistic about AI, but AI adoption requires attention to privacy and security, productivity, and training, according to GitLab....
Read more →September 2023 Patch Tuesday is here, with fixes for actively exploited vulnerabilities in Adobe Acrobat and Reader (CVE-2023-26369), Microsoft Word...
Read more →Kingston Digital has launched the Kingston IronKey D500S, a hardware-encrypted USB flash drive that provides military-grade security for classified data...
Read more →CTERA unveiled CTERA Vault, Write Once, Read Many (WORM) protection technology which provides regulatory compliant storage for the CTERA Enterprise...
Read more →Google has rolled out a security update for a critical Chrome zero-day vulnerability (CVE-2023-4863) exploited in the wild. About the...
Read more →Hijackers of Facebook business accounts are relying on fake business inquiries and threats of page/account suspension to trick targets into...
Read more →Bruschetta-Board is a device for all hardware hackers looking for a fairly-priced all-in-one debugger and programmer that supports UART, JTAG,...
Read more →Amazon Web Services (AWS) is the most extensive and widely-used cloud platform in the world, providing more than 200 services...
Read more →More than 80% of organizations have experienced an identity-related breach that involved the use of compromised credentials, half of which...
Read more →