Bachelor of Arts in English Writing from Lipscomb University
Recent ethical hacking efforts on Teslas emphasize how important IoT security is for businesses. Read more about IoT vulnerability news.
Configuring firewall rules is essential for maintaining proper network security. Discover what they are, the different types, and how to manage them now.
This week’s vulnerability news include GitHub credential access, a new Chrome fix, and hidden malware from pirated applications hosted on Chinese websites. Citrix and Ivanti are seeing more problems, too,…
Discover what vulnerabilities were exposed last week, including ones from major providers like SonicWall and Juniper Networks.
Discover the most common network security threats and how to protect your organization against them.
Discover which companies experienced breaches and exploited vulnerabilities during the holiday week in our vulnerability recap.
Learn about last week’s open-source software vulnerabilities, endangered data, and attacks from state-sponsored Russian threat groups.
Privilege escalation is a step in the attack chain where a threat actor gains access to data they are not permitted to see. Learn everything you need to know now.
Unified threat management devices offer a quick path to comprehensive security for SMEs. Compare top vendors now.
Lateral movement is used by attackers once a network is accessed to expand into other apps or networks within an organization. Learn more now.
Subscribe to Cybersecurity Insider for top news, trends & analysis