Cybersecurity
Protecting Assets in a Remote-First and Potentially Hostile World
By Chester Wisniewski
With both persistent attacks and post-pandemic remote work here to stay, modern security solutions must...
Cybersecurity
IT Teams at Risk of Being Caught Unawares by New OT Threat-Microsoft Report
Microsoft’s latest Cyber Signals report highlights how cybercriminals are using Operational Technology (OT) as gateways into an...
Cybersecurity
Sophos Managed Detection and Response (MDR) Service Grows Customer Base by 33%
Sophos today announced that its industry-first vendor-agnostic Managed Detection and Response (MDR) service has grown its customer...
Cybersecurity
Cyberattackers Leveraged More Than 500 Unique Tools and Tactics in 2022, Sophos
Sophos today released its Active Adversary Report for Business Leaders, an in-depth look at the changing behaviors...
Cybersecurity
Liquid C2 launches third Cyber Security Fusion Centre in Zambia
Liquid C2, a business of Cassava Technologies, a pan-African technology group, has launched a third Cyber...
Cybersecurity
IBM Security , a company that helps secure the world’s largest enterprises and governments with an integrated portfolio of...
Cybersecurity
Scammers are Moving Beyond Dating Apps and Increasingly Targeting Global Twitter and Text Users
Sophos has released details of two expansive, still operational, pig butchering or sha zhu pan rings (elaborate...
Cybersecurity
Here are the top 200 passwords in 2022
It's no surprise that password security continues to be a major concern for individuals and businesses alike....
Want to stay up to date with the latest news?
We would love to hear from you! Please fill in your details and we will stay in touch. It's that simple!