14 ways to secure business data, in layman’s languageMazhar Hamayun is a cyber security professional with over 20 years of hands-on technology and leadership experience. At...
Year: 2022
Multi-Cloud Networking and Security Makes a Splash at VMware Explore 2022
Multi-Cloud Networking and Security Makes a Splash at VMware Explore 2022The cloud has taken over the way enterprises do everything, from data storage to application development....
Multi-cloud with Continuous Risk-driven Security and Compliance
Multi-cloud with Continuous Risk-driven Security and ComplianceWe reviewed Zero Trust in a series of blogs earlier this month. In this blog, we are discussing a new...
A Pragmatic Response to the Quantum Threat
A Pragmatic Response to the Quantum ThreatYou certainly don't need to panic, but you do need to form a plan to prepare for the post-quantum reality.Leer...
Darktrace Shares Plunge After Thoma Bravo Acquisition Falls Apart
Darktrace Shares Plunge After Thoma Bravo Acquisition Falls ApartNo agreement could be reached on terms of a firm offer, the provider of AI-based cybersecurity products says.Leer...
Report Highlights Prevalence of Software Supply Chain Risks
Report Highlights Prevalence of Software Supply Chain RisksMulticlient research report shows organizations are significantly increasing efforts to secure their supply chains in response to software supply...
EvilProxy Bypasses MFA by Capturing Session Cookies
EvilProxy Bypasses MFA by Capturing Session CookiesThe latest ISMG Security Report discusses a new phishing-as-a-service toolkit designed to bypass multi-factor authentication, the decision by Lloyd's of...
Multi-Cloud Networking and Security Makes a Splash at VMware Explore 2022
Multi-Cloud Networking and Security Makes a Splash at VMware Explore 2022The cloud has taken over the way enterprises do everything, from data storage to application development....
Multi-cloud with Continuous Risk-driven Security and Compliance
Multi-cloud with Continuous Risk-driven Security and ComplianceWe reviewed Zero Trust in a series of blogs earlier this month. In this blog, we are discussing a new...
Multi-Cloud Networking and Security Makes a Splash at VMware Explore 2022
Multi-Cloud Networking and Security Makes a Splash at VMware Explore 2022The cloud has taken over the way enterprises do everything, from data storage to application development....
Multi-cloud with Continuous Risk-driven Security and Compliance
Multi-cloud with Continuous Risk-driven Security and ComplianceWe reviewed Zero Trust in a series of blogs earlier this month. In this blog, we are discussing a new...
Law Firm Says Year-Old Hack Affected PHI of 255,000 People
Law Firm Says Year-Old Hack Affected PHI of 255,000 PeopleBesides a Lag in Reporting, Some of the Compromised Data Was a Decade-OldA Michigan law firm recently...
North Korea Avoids Tornado Cash After US Imposes Sanctions
North Korea Avoids Tornado Cash After US Imposes SanctionsChainalysis Says It Helped Recover $30 Million in Hacked Ronin Bridge CryptoU.S. sanctions on Tornado Cash are driving...
Thief Steals $370,000 in Avalanche-Linked Flash Loan Attack
Thief Steals $370,000 in Avalanche-Linked Flash Loan AttackVictim Nereus Offers 'No Questions Asked' Reward for Return of Stolen FundsAn attacker stole at least $370,000 worth of...
LA School District Forewarned of Malware, Attack Risks
LA School District Forewarned of Malware, Attack RisksAlso: Vice Society Ransomware Gang Claims Credit for AttackThe only surprising aspect of the ransomware attack against Los Angeles...
Password manager LastPass reveals intrusion into development system
Password manager LastPass reveals intrusion into development systemLastPass, maker of a popular password management application, revealed Thursday that an unauthorized party gained access to its development...
Sorting zero-trust hype from reality
Sorting zero-trust hype from realityIt seems as if everyone is playing “buzzword bingo” when it comes to zero trust and its implementation, and it starts with...
Facebook agrees to settle class action lawsuit related to Cambridge Analytica data breach
Facebook agrees to settle class action lawsuit related to Cambridge Analytica data breachFacebook parent Meta Platforms agreed Friday to settle a class action lawsuit seeking damages...
Key takeaways from the Open Cybersecurity Schema Format
Key takeaways from the Open Cybersecurity Schema FormatOne of the most pervasive challenges in the current cybersecurity environment is an overabundance of tooling vendors, all of...
Multi-stage crypto-mining malware hides in legitimate apps with month-long delay trigger
Multi-stage crypto-mining malware hides in legitimate apps with month-long delay triggerResearchers have discovered a new multi-stage malware delivery campaign that relies on legitimate application installers distributed...
Nvidia partners with Dell and VMware for faster AI systems
Nvidia partners with Dell and VMware for faster AI systemsNew vSphere paired with Nvidia DPUs will speed up data center performance.Leer másCSO OnlineNew vSphere paired with...
Traceable AI debuts API testing product for its security platform
Traceable AI debuts API testing product for its security platformTraceable AI today announced the general availability of xAST, an API security testing solution, as part of...
Stuxnet explained: The first known cyberweapon
Stuxnet explained: The first known cyberweaponWhat is Stuxnet? Stuxnet is a powerful computer worm designed by U.S. and Israeli intelligence that to disable a key part...
Resolving conflicts between security best practices and compliance mandates
Resolving conflicts between security best practices and compliance mandatesSo, you read a great tip on the internet and think it would improve your security posture. Before...
Women in cybersecurity form non-profit organization The Forte Group
Women in cybersecurity form non-profit organization The Forte GroupA group of over 90 women working in cybersecurity roles have formed The Forte Group, a non-profit organization...
Palo Alto adds new SaaS compliance, threat prevention, URL filtering features to Prisma solution
Palo Alto adds new SaaS compliance, threat prevention, URL filtering features to Prisma solutionCybersecurity vendor Palo Alto Networks has announced new updates to its Prisma Secure...
Intro to MongoDB’s queryable encryption
Intro to MongoDB’s queryable encryptionQueryable encryption was the main attraction at MongoDB World 2022, for understandable reasons. It introduces a unique capability to reduce the attack...
Dashlane launches integrated passkey support for password manager with new in-browser passkey solution
Dashlane launches integrated passkey support for password manager with new in-browser passkey solutionPassword management vendor Dashlane has announced the introduction of integrated passkey support in its...
Remediant wants to move beyond PAM to secure enterprise networks
Remediant wants to move beyond PAM to secure enterprise networksSecurity software provider Remediant wants to move beyond basic privileged access management (PAM) to help CSOs secure...
Ragnar Locker continues trend of ransomware targeting energy sector
Ragnar Locker continues trend of ransomware targeting energy sectorThe recent attack on Greece’s largest natural gas transmission operator DESFA by ransomware gang Ragnar Locker is the...























