Preparing for a post-quantum future amid machine identities Kevin Bocek August 30, 2024 By focusing on machine identity management practices that incorporate post-quantum cryptography, organizations can build a secure foundation in both the present and the quantum future.Read More
Breach exposed information of more than 500,000 credit union members Jordyn Alger August 29, 2024 Security leaders discuss the Texas Dow Employees Credit Union breach that impacted more than 500,000 members. Read More
More than 650,000 education records exposed in the past 60 days Security Staff August 29, 2024 More than 650,000 records across various educational institutions have been exposed in the last 60 days. Read More
76% of MSPs faced an infrastructure cyberattack in last 12 months Security Staff August 29, 2024 MSP security was analyzed in a recent report finding that 76% of MSPs spotted a cyberattack on their infrastructure within the last 12 months.Read More
Protecting financial institutions in the era of AI-driven threats Shrav Mehta August 29, 2024 For financial institutions, being proactive about cybersecurity is the only way to protect the business and its customers. Read More
Why security professionals experience burnout Listen to Thomas Kinsella, Co-Founder & Chief Customer Officer at Tines, in this podcast episode. Security Staff August 28, 2024 Thomas Kinsella, Co-Founder & Chief Customer Officer at Tines, discusses the challenges contributing to burnout among security professionals. Read More
Susan Chiang hired as Chief Information Security Officer at Headway Security Staff August 28, 2024 Susan Chiang has been appointed Chief Information Security Officer at Headway, a mental health organization. Read More
Malicious actors are leveraging peak travel and vacation times Security Staff August 28, 2024 As Labor Day approaches, new data warns that cybercriminals are exploiting increased traffic to cover their attacks. Read More
How IT leaders can balance software needs with limited budgets Josh Mullis August 28, 2024 IT budget constraints are here to stay; thankfully, IT leaders can balance software needs with limited budgets. Read More
Cyberattacks on critical infrastructure increased by 30% in one year Security Staff August 27, 2024 A new report highlights the rising threat of cyber incidents against critical infrastructure. Read More