Nearly a Million Kubernetes Instances Exposed on Internet

Cybersecurity researchers have found more than 900,000 instances of Kubernetes consoles exposed on the internet. Cyble researchers detected misconfigured Kubernetes instances that could expose hundreds of thousands of organizations. The researche...

Cybersecurity Agencies Release Guidance for PowerShell Security

PowerShell is one of the most common tools used by hackers in "living off the land" attacks, when malicious actors use an organization's own tools against itself. This week, U.S. cybersecurity agencies joined their counterparts in the UK and New ...

Top Security Tools & Software for SMBs in 2022

Small businesses generally don’t have time to dip into logs several times a day, monitor every aspect of endpoint security via complex management consoles, or jump from point product to point product to stay on top of security. Instead, they want...

Hyperautomation and the Future of Cybersecurity

Next-gen AI systems are now baked into just about every category of software—but Gartner believes we can automate even further. For the last few years, Gartner has predicted that hyperautomation would become a global, if not necessary, business tren...

IT Security Resources

Latest Security News and Analysis

Endpoint Articles

Highly Sophisticated Malware Attacks Home and Small Office Routers

Security researchers have uncovered an unusually sophisticated malware that has been targeting small office/home office (SOHO) routers for nearly two years, taking advantage of the pandemic and rapid shift to remote work. Such routers are ra...

IT Buyers Don’t Take Security Seriously Enough: HP

Given the insane security environment we are in, it may seem weird to suggest that a tech company is too good at security. How can you be too good at something that is critical to the safety and operational resilience of companies and nations? Se...

Why You Need to Tune EDR to Secure Your Environment

Endpoint detection and response (EDR) solutions typically deploy in a standard configuration meant to deliver the least number of false positive alerts in a generic environment. This allows EDR to deploy very quickly, but it also allows for a numb...

Top Data Loss Prevention (DLP) Solutions

In an age of strong data privacy laws like GDPR and CCPA, data loss prevention (DLP) technology is becoming a critically important IT security tool. Every organization has data, and some of that data is more sensitive than others. Sensitive data c...

Top Products

Popular categories