Cato Networks introduces device context-driven access control to tackle remote working and BYOD risks
SASE platform provider Cato Networks has introduced a new risk-based application access control for combatting security threats and productivity challenges posed by remote working and...
Hackers Using Fake Police Data Requests against Tech Companies
Brian Krebs has a detailed post about hackers using fake police data requests to trick companies into handing over data. Virtually all major technology companies...
Cyber threats increasingly target video games – The metaverse is next
Photo by Adi Goldstein on Unsplash This blog was written by an independent guest blogger. The technical infrastructure of video games requires a significant level of access to...
Retailer The Works Closes Stores After Cyber-Attack
Suspected ransomware to blame but no card details taken Read More
Global APT Groups Use Ukraine War for Phishing Lures
Cyber-espionage campaigns make the most of big news event Read More
WhatsApp ‘Voice Message’ Is an Info-Stealing Phishing Attack
Armorblox warns of new campaign using Russian domain Read More
Real-time is where the cybersecurity risk is
I don’t know how many times I’ve heard cybersecurity professionals say something like, “Not having multi-factor authentication is a huge risk for our organization.” The...
5 ways to improve security hygiene and posture management
As management guru Peter Drucker famously said: ‘You can’t manage what you can’t measure.’ That’s certainly true when it comes to security hygiene and posture...
What is a botnet? When infected devices attack
Botnet definition A botnet is a collection of internet-connected devices that an attacker has compromised to carry out DDoS attacks and other tasks as a...
Jail Releases 300 Suspects Due to Computer “Glitch”
Outage caused by system update disrupts processing of defendants in Texas county Read More
