Microsoft Authenticator suppresses suspicious MFA notifications
Microsoft has quietly rolled out a new mechanism that shields users of its mobile Authenticator app from suspicious (and annoying) push notifications triggered by attackers.…
Microsoft has quietly rolled out a new mechanism that shields users of its mobile Authenticator app from suspicious (and annoying) push notifications triggered by attackers.…
Druva announced cloud-native protection for Azure backups, enabling customers to leverage the simplicity and value of SaaS across their cloud deployments. Druva’s 100% agentless, cloud-native…
The The Ultimate Guide to the CISSP covers everything you need to know about the world’s premier cybersecurity leadership certification. Learn how CISSP and ISC2…
Singapore-based luxury resort and casino Marina Bay Sands has suffered a data breach that exposed data of 665,000 non-casino rewards program members. The Marina Bay…
For SOC teams to be able to defend their organization against ransomware attacks, they need to have the right security toolset, but also an understanding…
The Aqua Trivy open-source scanner now supports vulnerability scanning for Kubernetes components and Kubernetes Bill of Materials (KBOM) generation. Now, companies can better understand the…
Companies need help to get visibility into the operations of their AI programs, potentially reducing productivity while creating significant risks around governance, data security, and…
Cloud computing carries many benefits for your business… as long as you can ensure the performance and availability of your cloud environments. Let’s take the…
Varonis announced major enhancements to its Microsoft 365 offering, adding more robust capabilities to continuously detect and prevent exposures in the world’s top cloud-based email…
As part of a broader initiative to strengthen security, Microsoft is rolling out Microsoft-managed Conditional Access policies in Entra ID (formerly Azure Active Directory) to…
Kentik, the network observability company, has released Kentik Kube, a solution that reveals how Kubernetes traffic routes through organizations’ data centers, clouds, and the internet.…
Malwarebytes launched ThreatDown, the product family that protects IT-constrained organizations with effective, easy-to-use cybersecurity. Formerly named Malwarebytes for Business, ThreatDown solutions are purpose-built to overpower…