-
The evolution of Zero Trust with AT&T: the ZTNA 2.0 advantage
PRIVACY PRIVACY This blog was jointly written with Kumar Ramachandran, Senior Vice President, Palo Alto Networks Most people can recall a time when computers were pieces of equipment that remained in a fixed location. Because of this, security was less of an issue outside of an organization’s own walls. That all changed when laptop computers…
-
Users Still in the Dark Over $5m Theft From Blockchain Firm Solana
PRIVACY PRIVACY Thousands of hot wallets drained in latest crypto blow Read More
-
Ukraine Shutters Major Russian Bot Farm
PRIVACY PRIVACY Over one million bots used to spread disinformation, says Kyiv Read More
-
11 stakeholder strategies for red team success
PRIVACY PRIVACY Red teams are a necessary evil – literally – in today’s cyber threat landscape. Motivations for engaging in offensive testing activities can vary from regulatory requirements to certification aspirations. Truly proactive and progressive security programs incorporate offensive operations almost immediately as security is built and defined. Most organizations start with vulnerability scanning and…
-
Experts Warn of Fake Football Ticket Scams
PRIVACY PRIVACY Fraudsters set to ramp up efforts as Premier League season approaches Read More
-
Thoma Bravo snares Ping Identity in $2.8 billion go-private deal
PRIVACY PRIVACY In the latest move in a series of security-company acquisitions, private equity firm Thoma Bravo announced Wednesday that it has reached an arrangement to acquire IAM (identity and access management) firm Ping for a total sale price of $2.8 billion. Ping Identity’s flagship product is its PingOne Cloud Platform, which acts as an…
-
Large-Scale Phishing Attacks Targeting Microsoft Enterprise Email Services
PRIVACY PRIVACY Most of the targeted organizations were located in the US, UK, New Zealand and Australia Read More
-
Missile Maker MBDA Refutes Hacking Allegations
PRIVACY PRIVACY While some files were indeed stolen, the company says it was not hacked Read More
-
Qualys adds external attack management capability to cloud security platform
PRIVACY PRIVACY Cloud security and compliance software company Qualys on Wednesday announced it is adding external attack surface management (EASM) capabilities to the Qualys Cloud Platform. The new capability will be integrated into Qualys CSAM (cybersecurity asset management) 2.0, an inventory monitoring and resolution tool to help security teams gain visibility into previously unknown internet-facing…
-
Ransomware Attacks Taking Toll on Security Professionals
PRIVACY PRIVACY The research took into consideration the responses of 500 IT security decision-makers in US and UK Read More