Search results for: “threat intelligence”
-
Top Unified Endpoint Management (UEM) Solutions
Unification has been a trend in IT for a long time, whether it’s communications, storage, data management or other technologies, and the trend hasn’t escaped…
-
Okta ‘Breaches’ Weren’t Really Breaches
With two high-profile breaches this year, Okta, a leader in identity and access management (IAM), made the kind of headlines that security vendors would rather…
-
The Challenges Facing the Passwordless Future
For years the tech industry has promised a shift toward a passwordless future. In 2013, for example, the FIDO Alliance was created to solve the…
-
Software Supply Chain Security Guidance for Developers
Whether it’s package hijacking, dependency confusing, typosquatting, continuous integration and continuous delivery (CI/CD) compromises, or basic web exploitation of outdated dependencies, there are many software…
-
Best Fraud Management Systems & Detection Tools
Fraud is one of the most prevalent vulnerabilities in the modern world. According to the FTC, over 28 million fraud reports were filed by consumers,…
-
CVSS Vulnerability Scores Can Be Misleading: Security Researchers
Vulnerability management systems based on the Common Vulnerability Scoring System (CVSS) v2 scoring system may be misguided, as a new report found that roughly half…
-
Cobalt Strike Inspires Next-generation Crimeware
Cobalt Strike is a legitimate vulnerability scanning and pentesting tool that has long been a favorite tool of hackers, and it’s even been adapted by…
-
New Quantum-safe Cryptography Standards Arrive None Too Soon
A six-year quantum cryptography competition just ended, producing four new security standards selected by the U.S. Department of Commerce’s National Institute of Standards and Technology.…
-
Hyperautomation and the Future of Cybersecurity
Next-gen AI systems are now baked into just about every category of software—but Gartner believes we can automate even further. For the last few years,…
Latest Articles
Popular Categories
- Applications (99)
- Artificial Intelligence (1)
- Cloud (77)
- Compliance (35)
- Cybersecurity (33)
- Endpoint (74)
- Mobile (41)
- Networks (339)
- News (6)
- Products (366)
- Security (1)
- Sponsored (1)
- Threats (351)
- Trends (199)
- Video (17)