dcsimg

From the experts who also bring you:

eWeekLogo
ITBELogo
DeveloperLogo
eSFLogo
ServerwatchLogo
DatamationLogo

LATEST SECURITY NEWS AND ANALYSIS

NewsletterSECURITY DAILY NEWSLETTER

GET SECURITY NEWS IN YOUR INBOX EVERY DAY
|

Securing Office 365 Vulnerabilities with Okta

Office 365 is a highly targeted application for hackers because it is widely deployed across industries. Okta’s security team commonly sees customers experiencing phishing, password spraying, and brute-force attacks, to name a few. Office 365 uses several authentication …

Responding to Data Center Outages: 6 Keys to Developing an Effective Response Plan

As technology continues to evolve and grow more complex, so do the crises that arise when things go wrong. The root causes of outages have also been shifting in recent years, with cybercrime alone increasing 20%. Data center outages are becoming costlier for organizations, both financially …

Who Needs Malware? How Adversaries Use Fileless Attacks to Evade Your Security

The arms race between cybersecurity vendors and determined adversaries has never been more heated. As soon as a new security tool is released, threat actors strive to develop a way around it.  One advanced threat technique that is experiencing success is the use of fileless attacks, …

How Are You Responding to Threats? SANS 2018 Incident Response Survey Part 1

What new and continuing threats are responders uncovering in investigations, and how are they dealing with those threats? This on-demand webcast releases results from the SANS 2018 Incident Response Survey that examines how incident response (IR) teams are coping with organizational …