Facebook said Russian state actors and others are relentlessly trying to use the social network against the Ukraine with deception, hacking and coordinated bullying campaigns. [Read More]
Nudge Security, an early stage startup promising to help organizations manage cybersecurity decisions, has emerged from stealth with a $7 million seed round. [Read More]
India says it foiled an cyberattack by Chinese hackers targeting its power distribution system near a disputed frontier where the two countries are engaged in a military stand-off. [Read More]
A data theft tool used by the BlackCat (ALPHV) ransomware group shows the cybercriminals are increasingly interested in industrial organizations. [Read More]
Obfuscation technology creates a path to data and applications residing in commercial clouds that cannot be traced, and can be helpful for healthcare data security
XDR architecture must be broad and deep so that organizations can get the most value out of their existing best-of-breed security solutions, including their free, open-source tools.
Cyber resilience is the only way to guarantee true Zero Trust. When implemented properly, resilient Zero Trust becomes a preventive measure that counteracts human error, malicious actions, and decayed, insecure software.
No matter how far you stray from having a perfect system — or how close you come to attaining one — the pursuit is always an essential and worthwhile investment of your time.
Many think open source intelligence is just another name for better googling. They are wrong. Good open source and threat intelligence are derived from three core capabilities.
Vendor agnostic technology, married with actionable, globally-sourced, and continually evolving intelligence, augmented by humans, is needed to defend our enterprises.
Zero Trust is not simply a product. If someone says it is, they probably either don't know what they're talking about or have watered down their marketing to the point of making it misleading.
There are areas where governments can learn from the private sector and vice-versa, which will help both sides adapt more quickly and effectively to a continuously evolving threat environment.