George Gerchow isn’t afraid to tell it like it is. As the CSO of Sumo Logic, he’s responsible for securing…
May 18, 2023The Hacker NewsCybersecurity Webinar Cybersecurity is constantly evolving, but complexity can give hostile actors an advantage. To stay…
There is a lot think about when it comes to security, but what is the one most important piece of advice…
In a world where staying connected is paramount, the need for a reliable and affordable family cell phone plan has…
Hewlett Packard Enterprise (HPE) has signed a memorandum of understanding (MoU) with the Crown Commercial Service (CCS) centred on the…
The NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE) welcomed four new members, including Ukraine, in a ceremony held at…
A joint advisory from the National Cyber Security Centre has detailed how the UK and its allies have cracked Snake,…
May 18, 2023Ravie LakshmananCryptocurrency / Server Security The notorious cryptojacking group tracked as 8220 Gang has been spotted weaponizing a…
Buried in the PAC report is the fact that government digital services often rely on outdated and unsupported legacy IT…
Most hacker-powered security happens remotely, with digital messaging being the typical communication channel. There’s no brainstorming together with a whiteboard,…
In a world where staying connected is paramount, the need for a reliable and affordable family cell phone plan has…
Digitalization initiatives are connecting once-isolated Operational Technology (OT) environments with their Information Technology (IT) counterparts. This digital transformation of the…










