Networks

Accenture Attack Highlights Evolving Ransomware Threats

Accenture officials are saying they staved off a ransomware attack this week by a cybercriminal ring using the LockBit malware even as the hacker...

Top Microsegmentation Software for 2021

It seems that no matter how many security technologies, network perimeters, and intrusion prevention safeguards are erected, the bad guys somehow find a means...

Top XDR Solutions for 2021

Extended detection and response (XDR) has emerged in the last few years as a new approach by cybersecurity vendors to unify their products into...

Best Incident Response Tools and Software for 2021

With major cybersecurity incidents an almost daily occurrence, organizations need an incident response plan for the likelihood that they will someday be breached. And...

Startup Sees File System as Key to Security

While many cybersecurity vendors approach zero trust from the perspective of microsegmentation, shrinking the network as much as possible, one startup thinks security needs...

13 Best Vulnerability Scanner Tools of 2021

Vulnerability scanning, assessment and management all share a fundamental cybersecurity principle: the bad guys can’t get in if they don’t have a way. To...

How Zero Trust Security Can Protect Against Ransomware

The Colonial Pipeline ransomware attack has been by many measures the worst to date in the history of cybersecurity, nearly crippling the Southeastern U.S....

Critical Infrastructure Protection: Physical and Cyber Security Both Matter

Oil and gas companies have two key areas of concern when addressing cybersecurity, especially in their unmanned remote facilities. They have to supply physical...

U.S. Issues Ransomware Guidance, Cybersecurity Executive Order

The U.S. Cybersecurity and Infrastructure Agency (CISA) and the FBI have issued guidance for protecting critical infrastructure from ransomware, shedding some light on the...

OAuth: Your Guide to Industry Authorization

Nearly a decade ago, the cyber industry was toiling over how to enable access for users between applications and grant access to specific information...

Latest articles