Cybersecurity Decluttered: A Journey to Consolidation
Credit to Author: David Ng| Date: Fri, 12 Apr 2024 00:00:00 +0000
Learn how far cybersecurity has come from scattered resources to consolidation the future.
Read moreCredit to Author: David Ng| Date: Fri, 12 Apr 2024 00:00:00 +0000
Learn how far cybersecurity has come from scattered resources to consolidation the future.
Read moreCredit to Author: Johnny Krogsboll| Date: Thu, 11 Apr 2024 00:00:00 +0000
Delve into the world of red team exercises, their vital role in enhancing organizational security through simulated cyberattacks, including tactics like phishing and lateral movement within networks, and understand the need for regular testing and improvement to counter evolving threats effectively.
Read moreCredit to Author: David Chow| Date: Wed, 13 Mar 2024 00:00:00 +0000
Explore two RPA and AI/ML use cases at HUD during the operational challenges of the longest US Government shutdown, a rigid legacy IT environment, and complex federal regulations.
Read moreCredit to Author: David Chow| Date: Tue, 13 Feb 2024 00:00:00 +0000
Trend Micro’s Chief Technology Strategy Officer discusses the biggest cybersecurity trends and what to watch for in 2024.
Read moreCredit to Author: Shannon Murphy| Date: Thu, 08 Feb 2024 00:00:00 +0000
After a full year of life with ChatGPT cybersecurity experts have a clearer sense of how criminals are using generative AI to enhance attacks – learn what generative AI means for cybersecurity in 2024.
Read moreCredit to Author: Chris LaFleur| Date: Thu, 18 Jan 2024 00:00:00 +0000
The overlooked vulnerability with real impacts
Read moreCredit to Author: Greg Young| Date: Thu, 07 Dec 2023 00:00:00 +0000
Every year, experts weigh in with predictions of what the big cybersecurity trends will be—but how often are they right? That’s the question Trend Micro’s Greg Young and Bill Malik asked recently on their Real Cybersecurity podcast, looking at what forecasters got wrong on a wide range of topics, from AI to human factors.
Read moreCredit to Author: Jon Clay| Date: Mon, 27 Nov 2023 00:00:00 +0000
Heading to AWS re:Invent 2023? Don’t miss out on our talk with Melinda Marks, ESG Practice Director for Cybersecurity, about cloud detection and response (CDR) and what’s trending in cloud security.
Read moreCredit to Author: Peter Girnus| Date: Mon, 20 Nov 2023 00:00:00 +0000
We uncovered the active exploitation of the Apache ActiveMQ vulnerability CVE-2023-46604 to download and infect Linux systems with the Kinsing malware (also known as h2miner) and cryptocurrency miner.
Read moreCredit to Author: Jon Clay| Date: Fri, 17 Nov 2023 00:00:00 +0000
Learn more about ALPHV filing a complaint with the Security and Exchange Commission (SEC) against their victim, which appears to be an attempt to influence MeridianLink to pay the ransom sooner than later.
Read more