Detecting and preventing account takeover (ATO) attacks Matt Cochran David Coxe August 27, 2024 A strong prevention strategy is more crucial than ever to reduce risks of account takeover (ATO) attacks. Read More
Engineering the human out of cybersecurity Bryan Schader August 26, 2024 Cybersecurity controls must be constantly evaluated to ensure they can withstand new and upcoming threats, especially those that target employees. Read More
8 vulnerabilities found in macOS operating system Microsoft apps Jordyn Alger August 22, 2024 Researchers discovered 8 vulnerabilities in macOS operating system Microsoft apps, and security leaders are sharing their insights. Read More
Security leaders discuss the National Public Data breach Jordyn Alger August 21, 2024 National Public Data experienced a breach potentially affecting 2.9 billion individuals.Read More
The integration security paradox: Strategies to protect data Buzz Hillestad August 21, 2024 Integration strategies and security threats evolve, so a comprehensive audit approach is essential. Read More
RansomHub threat actors observed using EDR-killing tool Jordyn Alger August 20, 2024 Security leaders weigh in on a recent ransomware encounter deploying an EDR-killing tool. Read More
Small businesses need to secure data before tapping into AI Edward Tuorinsky August 20, 2024 AI isn’t just for enterprises. It’s accessible and realistic for small companies to use too — if proper data protections are in place.Read More
Nashville man charged with aiding North Korean “laptop farms” Jordyn Alger August 19, 2024 A Nashville man has been charged with aiding North Korean “laptop farms.”Read More
Analytics at the source: A distributed approach to network security Jerry Mancini August 16, 2024 Taking a distributed approach to network security will ultimately enable IT organizations to more accurately identify vulnerabilities and threats. Read More
Mitigating human risk: Empowering a workforce to combat cyber threats Dr. Martin J. Kraemer August 16, 2024 As cybercriminals gain access to increasingly sophisticated tools, they continue to target employees, regarding them as the most vulnerable element of an organization’s defense. Read More