The adoption of cloud services gives elasticity to the enterprise, but it can also stretch the limits of traditional security protections and leave...
Author - GG
A CFO named Joe receives an email from CEO Taylor requesting a large payment to a contractor. In the email, Taylor stresses that the transfer is...
As concerns about nation-state threat activity around the world continue to increase, a new report by Recorded Future has identified a previously unknown...
Be careful where you click.
Ransomware, like other varieties of malware, is commonly distributed via phishing emails. One wrong click on a malicious link or...
E3’s live, in-person event appears to be unsurprisingly cancelled, according to LA city documents uncovered over the weekend.
As reported by Video Games...
Healthcare security service providers are on the frontline of a sharp rise in attacks against hospital and healthcare facilities.
Since the beginning of...
The SolarWinds hack has generated a lot of interest in the networking and cybersecurity spaces, particularly concerning penetration testing, or pen...
Listen to this podcast
This week’s Senate Intelligence Committee hearing on SolarWinds tackled the attribution case against Russian state-sponsored...
A key fact to know about network penetration testing for beginners: If an organization pays someone to try to break into its network, it typically wants...
Square Enix and People Can Fly have released their latest Outriders Broadcast for their upcoming RPG shooter, this time focusing on the game’s demo which...