We all know that cyber-criminal gangs spreading file encrypting malware are nowadays first stealing data and then encrypting it until…
If you’re interested in penetration testing and digital forensics, you know that Kali Linux is worth a try. And if…
It was a big year for cybersecurity in 2022 with massive cyberattacks and data breaches, innovative phishing attacks, privacy concerns,…
By Nick Merritt, Vice President of Security Products and Services, Halo Security Business leaders are confronted with headlines every day…
Most IT security professionals will focus on improving “detect” and “respond” capabilities, amidst concern over increasing costs and regulatory pressures,…
2022 is over, and it’s been filled with a wide assortment of stories ranging from the impact of Russia’s invasion…
Five Steps to Data-Centric Zero Trust Architecture That Works By Terry Ray, SVP Data Security GTM, Field CTO and Imperva…
By Michael G. McLaughlin, Associate, Baker, Donelson, Bearman, Caldwell & Berkowitz, PC Data privacy and protection have become both central…
At the time of writing, a misconfigured server belonging to an Enterprise Resource Planning (ERP) Software provider based in California,…
Ransomware attacks in 2022 impacted more than 200 hundred larger organizations in the U.S. public sector in the government, educational,…
SickKids Hospital, located in Toronto, is a center for medical education and research with a primary emphasis on the treatment…
Cybercrime as-a-service , Cyberwarfare / Nation-State Attacks , Endpoint Security Advisory Urges Customers to Update their Devices to the Latest…