With companies and organizations under siege on so many fronts over the past year, the last thing internal IT departments needed was another daunting...
First discovered in 1998, SQL injections (SQLi) are still a devastatingly effective attack technique and remain a top database security priority.
SQL, or Structured Query...
Malware, short for "malicious software," is any unwanted software on your computer that, more often than not, is designed to inflict damage. Since the...
A March 2020 software update of the SolarWinds Orion management platform gave malicious actors unhindered access to key government and enterprise networks. Microsoft has...
Protecting your organization from IT security risks is an ongoing, fluid task. Proactively identifying, mitigating and remediating security threats is one of the biggest...
IT security pros have never faced more threats, whether it's from the huge increase in remote work or aggressive nation-state sponsored hackers like those...
Forescout Research Labs last month released a 14-page white paper and a 47-page research report detailing 33 vulnerabilities affecting millions of Internet of Things...
Just when it seemed that 2020 couldn't get any weirder, news broke that Russian state-sponsored hackers had spent much of the year exploiting vulnerabilities...