Governance, Risk & Compliance
Tools Alone do not Automatically Guarantee Mature Secrets Management
Despite increased cybersecurity spending, there are certain areas where problems are only getting worse, such as secrets sprawl ...
Emerging Technologies, Evolving Threats: Strategies for Future-Proofing Data Security
With AI's ability to learn from data and continuously refine its tactics, cybercriminals can create more sophisticated, elusive and difficult-to-detect malware ...
Zero Trust defense for federal agencies
In January 2022, the U.S. federal government issued an Executive Order stating that federal agencies must meet specific cybersecurity requirements by the end of fiscal year 2024. The purpose of this order ...
Zero Trust defense for federal agencies
In January 2022, the U.S. federal government issued an Executive Order stating that federal agencies must meet specific cybersecurity requirements by the end of fiscal year 2024. The purpose of this order ...
US Sanctions Sinbad Mixer: Disrupting Threats Unveiled
The U.S. Treasury Department recently took a significant step in the ongoing battle against cybercrime by imposing sanctions on Sinbad. It’s a virtual currency mixer utilized by the North Korea-linked Lazarus Group ...
The Immutable “Chain of Custody” – Why Distributed Ledger is Critical to Modern IAM
In the wake of the hack at MOVEit and far too many other organizations this year, the secure, user-controlled, privacy-preserving benefits of distributed ledger technology (DLT) make it a critical component of ...
Russia Hacks Ukraine, Ukraine Hacks Russia — Day#658
When will it end? Russia takes down Kyivstar cellular system, Ukraine destroys Russian tax system ...
Inside the Challenges of XDR Implementation and How to Overcome Them
While XDR tackles the enterprise security challenge of threat detection across a diverse attack surface, it can also create new issues ...
CISA Unveils Tools to Strengthen Google Cloud Services
As organizations continue their migration to the cloud, threat groups are not far behind. According to a report earlier this year from cybersecurity firm CrowdStrike, the number of attacks against cloud environments ...
Apple Bops Beeper, but iMessage Android Whac-A-Mole Ensues
A new hope: Beeper’s reverse engineered iMessage integration, once killed by Tim’s crew, rises phœnix like ...