This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies By closing this message or continuing to use our site, you agree to our cookie policy. Learn MoreThis website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Brand impersonation attacks are a real and imminent threat across the cybersecurity landscape. Security sits down with Mimecast's Amber Johanson to discuss this cyber threat.
As cloud adoption expands, so do cloud security challenges, with 81% of organizations suffering a cloud-related security incident according to Venafi research.
An alleged attacker, seeking a ransom payment from Optus in exchange for millions of customer records, published 10,000 records online before retracting the threat and deleting all demands.
The 2022 New Jersey Cybersecurity Virtual Conference, hosted by Seton Hall University, aims to connect enterprise cybersecurity leaders with young professionals.
While there is no one-size-fits-all to security, here are some recommendations that organizations can use to reduce the threat of initial access brokers (IABs).