Upcoming Events

Conti Ransom Gang Starts Selling Access to Victims
Organizations infected with Conti’s malware who refuse to negotiate a ransom payment are added to Conti’s victim sha...Read more

Why cybersecurity leaders should focus on spending, people and technology (in that order)
Although cybersecurity continues to be top-of-mind for most organizations, organizations are dissatisfied with the state...Read more

Are You Hybrid Cloud-ready? 6 Considerations to Help You Get There
Adopting a hybrid cloud strategy and having a successful implementation of hybrid cloud are different things...Read more

SolarWinds hackers are going after cloud, managed and IT service providers
Nobelium, the APT actor behind the 2020 SolarWinds supply chain attack that served as a springboard for breaching others...Read more

CIO Agenda: Cloud, Cybersecurity, and AI Investments Ahead
Enterprises that employed "business composability" more likely to succeed during the volatility caused by the pandemic...Read more

Ransomware: How bad is it going to get?
Ransomware attacks have transformed into a much more costly and deadly threat leveraged mostly against organizations...Read more

Microsoft: Attackers Exploiting Windows Zero-Day Flaw
Attackers are exploiting a previously unknown vulnerability in Windows 10 and Windows Server versions to seize control...Read more

Thousands of internet-connected databases contain high or critical CVEs
Put your data on someone else's computer to keep it safe, urges Imperva...Read more

Healthcare cybersecurity: How to prevent the compromise of patient records?
“Cybercriminals have used the pandemic as a gateway to access protected health information (PHI)...”...Read more

Apple Issues Urgent Updates to Fix New Zero-Day Linked to Pegasus Spyware
Apple released iOS 14.8, iPadOS 14.8, watchOS 7.6.2, macOS Big Sur 11.6, Safari 14.1.2 to fix 2 actively exploited vulns...Read more

Why Are Security Problems So Hard to Solve?
Work and personal uses of devices absolutely do not mix, and in fact should not be able to install applications....Read more

“Worst cloud vulnerability you can imagine” discovered in Microsoft Azure
30% of Cosmos DB customers were notified—more are likely impacted....Read more

Using Threat Modeling to Boost Your Incident Response Strategy
Threat modeling is increasing in importance as a way to plan security in advance....Read more

T-Mobile confirms fifth data breach in three years
Cybercriminals accessed customers’ names, driver’s license details, government identification numbers, SSN, DOB, PIN...Read more