The Only Solution That Scales With the Cybersecurity Challenge
Cybersecurity is stretched thin. We all know it, so why state it again? Because cybersecurity is thinner today than yesterday. Because many keep repeating the…
Cybersecurity is stretched thin. We all know it, so why state it again? Because cybersecurity is thinner today than yesterday. Because many keep repeating the…
CyberSmart recently announced a record year of growth, marked by a large funding round, headcount and customer growth as well as geographical market expansion. The…
Arista Networks announced at the RSA Conference 2023 a cloud-delivered, AI-driven network identity service for enterprise security and IT operations. Based on Arista’s flagship CloudVision…
Thank you for joining! Access your Pro+ Content below. 25 April 2023 Data a driving force at Aston Martin Formula One Share this item with…
The Indian government hacked! The news looks like something out of a movie, but hacktivist groups have allegedly attacked several Indian government portals. Among the…
John Deere’s CISO, James Johnson, and his team are committed to ensuring that the people who depend on John Deere for their livelihood rest easy…
Astrix’s Security Research Group reported a 0-day flow in the Google Cloud Platform (GCP) related to an OAuth flow exploitation. This method was termed “Ghosttoken.” …
An ISO 27001 certification use case from Detectify with the on-demand webinar and a guide to implementation (download ebook): A SaaS start-up can only go…
Mossad Cyber Attack: Anonymous Sudan disrupted the Mossad website with a Distributed Denial of Service (DDoS) attack. Mossad, one of the most prominent intelligent agencies…
Phishing scams are a growing threat, and cybercriminals’ methods are becoming increasingly sophisticated, making them harder to detect and block, according to Zscaler report. The…
In 2020, we launched the Hack for Good program to allow ethical hackers to donate their bounties to charitable causes. With the world’s eyes on…
Microsoft has initiated the naming taxonomy for threat actor groups. Over the years, threat actors have evolved massively, leading to confusion about which threat actor…