News

Last year's M-Trends report highlighted that in three fourths of Ransomware intrusions, organizations were notified of a ransomware incident by an attacker ransom note. This upcoming webinar explores ...
Security champions programs are a proven method for scaling security across large development teams. But building and ...
In the last ten years, many industrial sites have begun merging their operational technology (OT) with enterprise networks, cloud platforms, and remote-access solutions. The payoff is enormous: ...
Ransomware attacks targeting U.K. organizations continued to rise last year the British government said it concluded despite ...
Protecting endpoints is one of the most critical security challenges in today’s organizations and must be prioritized at the highest levels of a robust cybersecurity strategy. According to IBM, ...
Whole-of-State cybersecurity is fast becoming the standard for state and local government, tapping into tomorrow’s emerging ...
Presented by Vijayakumar Chandrasekaran, Head of ICS-India, Standard Chartered Bank, Ashutosh Jain, Dr. Deepak Kalambkar, VP Infosec and Infrastructure, Safexpay, Dr. Ramesh Shanmuganathan, Executive ...
The Cybersecurity and Infrastructure Security Agency added the exploit to its Known Exploited Vulnerabilities Catalog with a CVSS score of 7.8. Ransomware threat actors exploited a zero-day ...
This report serves as a roadmap for addressing the evolving risks that APIs present. The findings make one thing clear: API security is not just a technical ...
Honeypots are not a new concept. Distributed honeypots can provide valuable information about attackers and attack patterns, ...
The British government has lost its bid to maintain "absolute" secrecy over its attempt to compel Apple to provide backdoor ...