The Cloud-Native Opportunity for Zero Trust
Cloud workload protection delivers on the promise of zero trust for virtual machines, containers, and serverless architectures across the application…
Cloud workload protection delivers on the promise of zero trust for virtual machines, containers, and serverless architectures across the application…
By Corey Nachreiner, CSO, WatchGuard Technologies The cybersecurity landscape of today is constantly evolving and threat actors are […] The…
Don’t let them look at your data. By Robert Freudenreich, CTO and Founder, Secomba GmbH | Boxcryptor A […] The…
The US Federal Bureau of Investigation (FBI) says the Ragnar Locker ransomware group has breached the networks of at least 52…
The makers of operational technology and connected devices saw reported vulnerabilities grow by half in 2021, but other trends may…
This sort of approach would enable cross-company and cross-sector threat information sharing, an effort that would allow companies to easily…
By Sam Hutton, SVP, Glasswall As ransomware attacks, insider threats, data breaches and phishing attacks against government agencies […] The…
The new EU regulation is a response to the rise of ransomware attacks and other new cyberthreats that have proliferated…
Threat actors have focused on two ends of the spectrum — quick, impactful attacks or stealthy intrusions — making strong…
Earlier this week, a Ukrainian security researcher leaked almost two years’ worth of internal chat logs from Conti, one of…