Risk management and mobile devices Listen to Jim Coyle, U.S. Public Sector Chief Technology Officer at Lookout, in this podcast episode Security Staff June 26, 2024 Jim Coyle, U.S. Public Sector Chief Technology Officer at Lookout, discusses what organizations can do to manage mobile device risks. Read More
Does GPT-4 risk accelerating cybercrime? Dakota Murphey June 20, 2024 While the technological breakthrough of GPT-4 holds immense potential for streamlining tasks and augmenting human teams, it also raises several security concerns and risks accelerating cybercrime. Read More
Email obfuscation tactics elude security protections J Stephen Kowski June 19, 2024 Threat researchers have uncovered newly evolving email obfuscation techniques that are designed to evade modern security controls. Read More
6 months of SEC cybersecurity disclosure rules: An updated view Mark Millender June 17, 2024 As the 6-month mark of the SEC’s new cybersecurity disclosure regulations approaches, it’s a good time to reflect on the requirements. Read More
Research reveals new ransomware variant called Fog Security Staff June 12, 2024 Research has revealed the development of a new ransomware variant called Fog. Read More
Global News Cybercriminals target SAP vulnerabilities Taelor Sutherland June 12, 2024 SAP vulnerabilities are targeted by cybercriminalsRead More
Special Report Safeguarding healthcare facilities Security leaders discuss navigating security challenges at hospitals and healthcare facilities. Rachelle Blair-Frasier June 6, 2024 Security leaders discuss navigating security challenges at hospitals and healthcare facilities.Read More
Research reveals top 10 malware detections Security Staff June 5, 2024 The top 10 malware detections have been revealed in new research. Read More
83% of organizations faced at least one account takeover the past year Security Staff June 5, 2024 A new survey reveals that account takeovers are a prominent threat. Read More
Living off the land in a victim’s network Matt Malarkey May 31, 2024 Despite sophisticated threat and detection tools, cyber adversaries have proven that they are able to maintain a presence on a victim’s network. Read More