Security leaders discuss the National Public Data breach Jordyn Alger August 21, 2024 National Public Data experienced a breach potentially affecting 2.9 billion individuals.Read More
The integration security paradox: Strategies to protect data Buzz Hillestad August 21, 2024 Integration strategies and security threats evolve, so a comprehensive audit approach is essential. Read More
2 out of 3 Americans cannot distinguish AI voices from real voices Security Staff August 20, 2024 A survey has revealed that 2 out of 3 Americans cannot distinguish AI voices from real voices. Read More
RansomHub threat actors observed using EDR-killing tool Jordyn Alger August 20, 2024 Security leaders weigh in on a recent ransomware encounter deploying an EDR-killing tool. Read More
Small businesses need to secure data before tapping into AI Edward Tuorinsky August 20, 2024 AI isn’t just for enterprises. It’s accessible and realistic for small companies to use too — if proper data protections are in place.Read More
Security leaders weigh in on the Trump campaign hack Jordyn Alger August 19, 2024 The Trump campaign was hacked, and security leaders are sharing their insights. Read More
72% of cybersecurity leaders faced a cyberattack in last 18 months Security Staff August 19, 2024 A report found that 72% of surveyed cybersecurity professionals in the U.S. have been targeted by cyberattacks in the past 18 months.Read More
Nashville man charged with aiding North Korean “laptop farms” Jordyn Alger August 19, 2024 A Nashville man has been charged with aiding North Korean “laptop farms.”Read More
Preparing for cybersecurity challenges: Ensuring a safe school year Ram Movva August 16, 2024 By proactively taking certain security measures, security teams can fortify their digital infrastructure and ensure a safer school environment year-round.Read More
Analytics at the source: A distributed approach to network security Jerry Mancini August 16, 2024 Taking a distributed approach to network security will ultimately enable IT organizations to more accurately identify vulnerabilities and threats. Read More