News
How Threat Modeling Helps Defend Against APT: The Most Complex Cyberattack
Just how long can advanced persistent threat last? What is the most complex cyberattack? While the answer is certainly up for debate, a leading...
Insider Threats: Why These Cybersecurity Incidents Continue to Grow
With the rising threat of ransomware and other attacks that originate from outside organizations’ networks, it’s easy to forget the damage that an...
Ice Phishing Takes Advantage of Tectonic Shift to Web3
The Badger DAO attack last November and December—during which an attacker stole about $121 million from users—is a good example of “ice phishing” on...
A Look at What to Expect in the Cybersecurity World in 2022
Some cybersecurity experts say that complex cybersecurity challenges are coming in 2022, with new types of supply chain-related attacks and attacks...
Attackers Exploit OMIGOD Flaw in Azure Despite Microsoft Fixes
Cybercriminals are targeting Linux-based servers running Microsoft’s Azure public cloud environment that are vulnerable to flaws after Microsoft...
Cloudflare Launches Public Bug Bounty Program
Cloudflare on Tuesday added a public bug bounty program, the vendor’s first such initiative since the cloud security company started its bug bounty...
7 Privacy Tips for Security Pros
Track the Data Tom Garrubba, a vice president at Shared Assessments, says privacy is specifically focused on what an organization is permitted to do...
Is Multicloud Ready to Become the Cornerstone of DevOps?
Today’s IT reality is distributed and heterogeneous, from the applications to the infrastructure they run on. Organizations are navigating how to...
Data Privacy: Experts Share How Far We’ve Come and How Far We Have to Go
Data Privacy Day occurs each year on January 28 and was created to raise awareness and promote privacy and data protection best practices. Data...