CISA Issues New Directive for Patching Known Exploited Vulnerabilities
The goal is to reduce civilian federal agency exposure to attacks that threat actors are actively using in campaigns, agency…
The goal is to reduce civilian federal agency exposure to attacks that threat actors are actively using in campaigns, agency…
MITRE shared a list of the topmost dangerous programming, design, and architecture security flaws plaguing hardware this year. [...]
Enhanced ransomware detection, visualization of ransomware communications, and risk customization helps organizations respond to cyberattacks in minutes.
As more organizations use application programming interfaces for Web applications, attacks and security incidents targeting APIs continue to grow.
Filling crucial roles in cybersecurity and addressing the talent shortage requires rethinking who qualifies as a "cybersecurity professional" and rewriting…
The top 10 categories of digital threats on macOS are all adware programs, with only a sliver of the share…
Why a passion for helping people is key to delivering effective cybersecurity solutions.
Many organizations are not properly protecting their storage and backup systems from compromise, new study finds.
GriftHorse’s premium service scams. Facebook open sources a static analysis tool. Update on the Group-IB affair. What the Familiar Four…
By Ranjan Goel, Vice President, Product Management, LogicMonitor IT teams are under immense pressure to work faster than […] The…