Browsing Category
Cybersecurity
Investigators Seize $30m in Stolen Crypto from North Korea
The US authorities are celebrating after grabbing about 10% of the cryptocurrency stolen by North Korean state hackers in the…
Hackers Compromise Employee Data at PVC-Maker Eurocell
A leading British PVC manufacturer has been contacting current and former employees to inform them about a “substantial” data…
Leading a Revolution to Provide Secure CCTV Cameras
By Mitch Muro, Product Marketing Manager, Check Point Software Technologies
When building IoT devices, it is important to…
Vulnerability in WordPress BackupBuddy Plugin Exploited By Hackers
Hackers have attempted to exploit a zero–day flaw in a WordPress plugin called BackupBuddy five million times, sometimes…
Integrated Risk Modeling – Cyber Defense Magazine
Better Intel for Managing Risk
By Andrew Beagley, Chief Risk Officer, OptimEyes.ai
An Integrated Risk Modeling & Reporting…
How Zero Trust and Secure Identities Can Help You Prevent Ransomware…
By Danna Bethlehem, Director Identity and Access Management (IAM), Thales
With ransomware attacks on the rise in a big way,…
Queen Elizabeth II – 1952 – 2022
We are deeply saddened by the passing of Her Majesty Queen Elizabeth II who dedicated her life to service.
She brought comfort,…
ZTNA and the Distributed Workforce: Hype vs. Reality
By Timothy Liu, CTO & Co-Founder, Hillstone Networks
ZTNA, or zero-trust network access, seems to be one of the hottest…
Rapid7 Discusses SIGMA Spectrum Infusion Pump and Wi-Fi Battery…
On April 20, 2022, Rapid7 discovered vulnerabilities in two TCP/IP–enabled medical devices produced by Baxter Healthcare.
The…
Over 10% of Enterprise IT Assets Found Missing Endpoint Protection
More than 10% of enterprise IT assets are missing endpoint protection and roughly 5% are not covered by enterprise patch…