Don't let mistakes bother you

If you don't care, you may become a victim of spam

What is pretexting? Definition, examples, and attacks

Pretexting definition Pretextingis form of social engineering in which an attacker fabricates a story to convince a victim […]

Reveal of Chinese-controlled botnet is another warning to CISOs to keep up with asset and patch management

A Chinese-controlled botnet of tens of thousands of unpatched internet-connected firewalls, network attached storage devices, internet-connected […]

Need better network performance? Adopt better secure networking strategies

Many organizations consider digital acceleration a key initiative because those in the C-Suite and IT leadership […]

Microsoft warns of ransomware attacks on US healthcare

Ransomware group Vanilla Tempest is targeting US healthcare providers using the INC ransomware service, according to […]

Companies skip security hardening in rush to adopt AI

Security analysis of assets hosted on major cloud providers’ infrastructure shows that many companies are opening […]

Deepfakes break through as business threat

Deepfakes targeting enterprise financial data used to be a hypothetical concern, but that’s no longer the […]

Active Directory Hardening: Best Practices and Checklist

As cyber threats continue to be more sophisticated, the need for active directory security becomes paramount. […]

Automate Everything With Python and Bash

Hey there! You ever think about how amazing it would be to just automate your life […]

Do boards understand their new role in cybersecurity?

Julie Ragland was CIO of vehicle manufacturing company Navistar, and has held IT leadership roles at […]

How cybersecurity red teams can boost backup protections

Cybersecurity red teams are known for taking a more adversarial approach to security by pretending to […]