As more and more businesses move their operations online due to digital transformation, the need for securing becomes more pressing.…
Browsing: Malware and Vulnerabilities
Threat detection is harder today than it was two years ago. Next year will be harder than this year. Why?…
New findings from Venafi show 81% of companies have had a Cloud Security Incident in the last year. Key findings:…
Lumen’s Black Lotus Labs blogs about discovering a new rapidly growing, multipurpose malware written in the Go programming language. Dubbed…
One of the founding fathers of the United States, Benjamin Franklin, once famously advised that an ounce of prevention is…
iStorage calls for mass adoption of encryption to help stem the rise of cyber crime and limit the impact of…
Using a VPN is essential to access a network securely. This article explains VPNs, what VPNs do, and why you…
A buyer dilemma is happening now with security solutions as business owners and CISOs realize that legacy rules-based WAF is…
A 15-yr old vulnerability in Python’s tarfile modules could potentially put 350,000 open source projects at risk.
Today’s subscription economy makes accessing nearly any service as easy as hitting enter. The same model has now entered the…