Zero trust systems faces zero confidence in implementation
Security professionals tasked with implementing zero-trust systems admit to a lack of confidence in their ability to actually apply it
Read moreSecurity professionals tasked with implementing zero-trust systems admit to a lack of confidence in their ability to actually apply it
Read moreA total of five high-rated Cisco vulnerabilities, dubbed collectively as CDPwn, have been confirmed today – please don’t ignore them
Read moreNewly published research into the enterprise ransomware threatscape reveals the most common vulnerabilities that are being used to target businesses
Read moreTwo years on from its explosive first appearance in 2017, why does the WannaCry threat still dominate the ransomware scene?
Read moreA Continuous Adaptive Risk and Trust Assessment (CARTA) approach to your security posture isn’t exactly new, but it is essential
Read moreResearchers from ESET have revealed new versions of malware families linked to the Ke3chang APT group used to target diplomats
Read moreResearch finds efforts to improve enterprise cybersecurity are hamstrung by a lack of visibility into technical assets and security controls
Read moreProtecting data in the cloud isn’t rocket science, getting a few basics of security hygiene right is all it takes
Read moreNew research from Malwarebytes Labs suggests that threat actors are refocusing their attack efforts on businesses rather than the consumer
Read more