Learn about the latest cyber developments coming out of Russia, Ukraine, Iran, China and North Korea from cyber threat leaders Dmitri Alperovitch and Sandra Joyce.
There's a new Linux threat: the Symbiote malware. Its main objective is to harvest credentials and facilitate backdoor access to infected machines, according to new BlackBerry and Intezer research.
The Threat Intelligence Report from Avertium analyzed Black Kite cybersecurity findings to rank the top five cybersecurity threats facing the education sector, including ransomware, data breaches and more.
Purposeful collaboration is fundamental to getting security right. To create this sense of community, security teams need to regularly engage employees, inform leadership, and demonstrate organizational value.
Any comprehensive approach to cybersecurity must include a detailed third-party risk assessment, covering an assessment of how partners view governance, risk, and compliance within their own organizations.
Given the increase of attacks on critical infrastructure and third-party suppliers and supply chain partners, let's address security concerns for supply chains and quick solutions.
Security leaders should focus on risk management principles when tackling software supply chain security, according to the Center for Internet Security SVP and Chief Evangelist Tony Sager.