
Deepfakes break through as business threat
Deepfakes targeting enterprise financial data used to be a hypothetical concern, but that’s no longer the […]
Active Directory Hardening: Best Practices and Checklist
As cyber threats continue to be more sophisticated, the need for active directory security becomes paramount. […]
Automate Everything With Python and Bash
Hey there! You ever think about how amazing it would be to just automate your life […]

Do boards understand their new role in cybersecurity?
Julie Ragland was CIO of vehicle manufacturing company Navistar, and has held IT leadership roles at […]

How cybersecurity red teams can boost backup protections
Cybersecurity red teams are known for taking a more adversarial approach to security by pretending to […]

SpyCloud Unveils Massive Scale of Identity Exposure Due to Infostealers, Highlighting Need for Advanced Cybersecurity Measures
Research indicates that an infostealer malware infection is often a precursor to a ransomware attack SpyCloud, […]

Australian cops bust underworld app through compromised software updates
Australia’s Federal Police (AFB) said it hacked into a dedicated encrypted communication platform, Ghost, to dismantle […]

Personhood: Cybersecurity’s next great authentication battle as AI improves
CISOs may be intimately familiar with the dozens of forms of authentication for privileged areas of […]

Cybersecurity vet Madison Horn makes her bid for US Congress
It’s safe to say that Madison Horn is the only candidate for US Congress in history […]

Microsoft fixes Authenticator design flaw after eight years overwriting accounts
Having ignored user complaints about a security design flaw within Microsoft Authenticator for eight years, Microsoft […]