A school district’s guide to vendor risk managementVendor security is an important concern for school districts as students become digitally native at young ages. Educators can...
Day: November 17, 2022
Critical Infrastructure’s Open Source Problem
Critical Infrastructure’s Open Source Problem Open source has a security problem, and that could have real-world impact when it affects critical infrastructure. According to research from...
Cybercrime is the New Covid
Cybercrime is the New CovidCovid-19 is sooo 2020! Data breaches, ransomware, and cybercrime are trending this year, and sadly, it doesn’t seem like they are slowing...
GRIT Ransomware Report: October 2022
GRIT Ransomware Report: October 2022 October demonstrated an interesting month in the ransomware environment. Lockbit, the most prolific ransomware group in 2022, saw a massive […]...
Introducing Recon to Stay Ahead of Attackers
Introducing Recon to Stay Ahead of Attackers API security can feel impossible to master. That's because you need to know how many APIs you have, the...
Vendor Lock-In, or Just Too Sticky?
Vendor Lock-In, or Just Too Sticky?What’s vendor lock-in? Vendor lock-in refers to your inability to easily switch from one vendor’s service or products to another’s. A...
Dell Appliance Uses Machine Learning to Automate Data Protection
Dell Appliance Uses Machine Learning to Automate Data Protection Dell Technologies today unveiled an integrated Dell PowerProtect Data Manager Appliance that increases cyberresilience by using machine...
Data Privacy and Remote Work: Three Things Businesses Need to Know
Data Privacy and Remote Work: Three Things Businesses Need to Know Due to the COVID-19 pandemic, a large-scale and abrupt shift in employee work habits from...
People Are People: Gender Equality at Praetorian
People Are People: Gender Equality at PraetorianEarly this Summer, we shared our thoughts on the industry-wide shortage of cybersecurity talent to meet an ever-growing demand. One...
100 Apps, Endless Security Checks
100 Apps, Endless Security ChecksOn average, organizations report using 102 business-critical SaaS applications, enabling operations of most departments across an organization, such as IT and Security, Sales, Marketing,...
Chinese Spy Gets 20 Years for Aviation Espionage Plot
Chinese Spy Gets 20 Years for Aviation Espionage PlotUS authorities land a rare win in fight against state-backed info-theftLeer másUS authorities land a rare win in...
FBI-Wanted Leader of the Notorious Zeus Botnet Gang Arrested in Geneva
FBI-Wanted Leader of the Notorious Zeus Botnet Gang Arrested in GenevaA Ukrainian national who has been wanted by the U.S for over a decade has been...