Forrester Wave: Security Awareness & Training Solutions (SA&T)Forrester Wave: Security Awareness & Training Solutions (SA&T) The most recent Forrester Wave: Security Awareness & Training (SA&T) report...
Day: November 7, 2022
Geopolitics plays major role in cyberattacks, says EU cybersecurity agency
Geopolitics plays major role in cyberattacks, says EU cybersecurity agencyThe ongoing Russia-Ukraine conflict has resulted in an increase in hacktivist activity in the past year, with...
Cybersecurity’s Role in Combating Midterm Election Disinformation
Cybersecurity’s Role in Combating Midterm Election DisinformationKatie Teitler, Senior Cybersecurity Strategist at Axonius and co-host on the popular Enterprise Security Weekly podcast, joins us to discuss...
Japan Joins Key NATO Cyber Agency
Japan Joins Key NATO Cyber AgencyAnother show of strength for the Cooperative Cyber Defence Centre of ExcellenceLeer másAnother show of strength for the Cooperative Cyber Defence...
Qualys previews TotalCloud FlexScan for multicloud security management
Qualys previews TotalCloud FlexScan for multicloud security managementVulnerability management vendor Qualys this week announced the trial availability of its TotalCloud with FlexScan offering, an agentless, cloud-native...
Free Trial for Code Signing Certificate: Myth or Fact?
Free Trial for Code Signing Certificate: Myth or Fact?If you are a code publisher or software developer, your end-users need to trust your software that they...
Robin Banks Phishing Service for Cybercriminals Returns with Russian Server
Robin Banks Phishing Service for Cybercriminals Returns with Russian ServerA phishing-as-a-service (PhaaS) platform known as Robin Banks has relocated its attack infrastructure to DDoS-Guard, a Russian provider of...
How to prepare for a SOC 2 audit – it’s a big deal, so you’d better get ready
How to prepare for a SOC 2 audit – it’s a big deal, so you’d better get readyOrganizations that want to prove to others – and...
What Businesses Need to Know About Ransomware Removal and Recovery
What Businesses Need to Know About Ransomware Removal and RecoveryWhat are the key things businesses need to know about ransomware removal and recovery? The post What...
What are message queues? | Importance, use cases and vulnerabilities | Contrast Security
What are message queues? | Importance, use cases and vulnerabilities | Contrast Security Many significant concerns arise while developing modern-day applications in the cloud, including uptime,...
Twitter Blue Badge email scams – Don’t fall for them!
Twitter Blue Badge email scams – Don’t fall for them!That was the week that was...Leer másNaked SecurityThat was the week that was...










