How to Find the Right CISO

How to Find the Right CISO
COMMENTARY The artificial intelligence (AI) investment cycle we are currently in will drive new levels of cybersecurity risk in pretty ...
Read more

Understanding Cloud Identity Security (CIS)

Understanding Cloud Identity Security (CIS)
In today’s digital landscape, where businesses increasingly rely on cloud-based services, ensuring the security of identities within these environments has ...
Read more

Windows ‘Downdate’ Attack Makes Patched PCs Vulnerable

Windows ‘Downdate’ Attack Makes Patched PCs Vulnerable
Fully patched Windows 11 systems are vulnerable to attacks that allow an adversary to install custom rootkits that can neutralize ...
Read more

INE Launches Initiative to Optimize Year-End Training Budgets with Enhanced Cybersecurity and Networking Programs

INE Launches Initiative to Optimize Year-End Training Budgets with Enhanced Cybersecurity and Networking Programs
Cary, NC, October 28th, 2024, CyberNewsWire As the year-end approaches, it’s common for enterprises to discover they still have funds ...
Read more

My Journey From the Air Force to Cybersecurity

My Journey From the Air Force to Cybersecurity
COMMENTARYWhen I stepped foot onto Mountain Home Air Force Base in 2003, I had no way of knowing how much ...
Read more

Beware of Shadow AI Haunting Organizations This Halloween

Beware of Shadow AI Haunting Organizations This Halloween
As Halloween approaches, there’s more to be afraid of than the typical ghosts and goblins. In the world of cybersecurity, ...
Read more

SolarWinds Breach Victims Fined for Vague Reporting

SolarWinds Breach Victims Fined for Vague Reporting
The initial attack might be years old, but regulators at the Securities and Exchange Commission (SEC) are still sifting through ...
Read more

PRODUCT REVIEW: Fortra’s Digital Brand Protection Solution

PRODUCT REVIEW: Fortra’s Digital Brand Protection Solution
THE GROWING CHALLENGE OF BRAND IMPERSONATION Brand impersonation has become one of the most damaging threats facing organizations in the ...
Read more

Russia’s APT29 Mimics AWS to Steal Windows Credentials

Russia’s APT29 Mimics AWS to Steal Windows Credentials
Russia’s premiere advanced persistent threat group has been phishing thousands of targets in militaries, public authorities, and enterprises. APT29 (aka ...
Read more

Unlocking Business Growth: The Need for Cyber Risk Quantification

Unlocking Business Growth: The Need for Cyber Risk Quantification
Business decisions hinge on well-calculated risk and high-quality, timely data. Leaders must continually interpret this data, anticipate future needs and ...
Read more