Twilio has been hacked by a relentless threat actor who successfully tricked employees into giving up login credentials that were then used to steal third-party customer data. [Read More]
Canadian security firm HYAS has released a new DNS protection tool that was designed to provide clear visibility into DNS transactions into production networks. [Read More]
Texas startup Ghost Security emerged from stealth this week with $15 million in investments from 468 Capital, DNX Ventures, and Munich Re Ventures. [Read More]
RegScale scores $20 million in early-stage capital from SYN Ventures, SineWave Ventures, VIPC’s Virginia Venture Partners and SecureOctane. [Read More]
The cryptocurrency division of Robinhood has been slapped with a $30 million penalty for "significant violations" of New York state's cybersecurity and money laundering regulations. [Read More]
VMware patches dangerous security flaw that allows malicious actor with network access to the UI to obtain administrative access without the need to authenticate. [Read More]
Cybersleuths at Microsoft discover a link between the recent ‘Raspberry Robin’ USB-based worm attacks and the notorious EvilCorp ransomware operation. [Read More]
In testimony before the the US House Intelligence Committee, security pros at Google and Citizen Lab make fresh calls for a wholesale clampdown on problematic commercial spyware vendors. [Read More]
Organizations can strengthen their security posture by getting detailed information on current attack techniques and keeping their employees’ cyber hygiene training up to date.
Security orchestration is about getting multiple systems in the Security Operations Center (SOC) to work together so you can detect, remediate and respond across the infrastructure.
Digital acceleration, user demand, and shifting business strategies add new edges to the network, making it increasingly difficult to manage and even harder to secure.
Linux is becoming a more popular target for attackers as it operates the back-end systems of many networks and container-based solutions for IoT devices and mission-critical applications.
Security systems can struggle to keep up when networks are in a constant state of flux—optimizing connections, redirecting workflows, adding new edges or endpoints, or scaling to meet shifting demands.
Cyber resilience is the only way to guarantee true Zero Trust. When implemented properly, resilient Zero Trust becomes a preventive measure that counteracts human error, malicious actions, and decayed, insecure software.
No matter how far you stray from having a perfect system — or how close you come to attaining one — the pursuit is always an essential and worthwhile investment of your time.