The day's top cybersecurity news and in-depth coverage
June 18, 2021
As these examples show, vulnerabilities can lurk within production code for years or decadesâand attacks can come at any time. Read more â¶
Discover how to best align your security awareness training program KPIs with your overall cybersecurity goals. On June 22nd, join Terranova Security, sponsor Microsoft and a line up of industry experts like Gartner for the 2021 Security Awareness Virtual Summit! Register Today!
Microsoft's Active Directory PKI component commonly have configuration mistakes that allow attackers to gain account and domain-level privileges.
Managing risk across an extended supply chain is extremely challenging for organizations of all sizes. To address this, organizations need to understand their supply chain structure, the vulnerabilities that make it fragile, and which vulnerabilities present the highest risk.
Healthcare organizations can expect ransomware, botnets, cloud misconfigurations, web application attacks, and phishing to be their top risks.
Each cloud platform differs in the security tools and features it offers customers to help them protect their cloud assets.
Your users are in the crosshairs of the best attackers out there. Follow these steps to better protect them.