The day's top cybersecurity news and in-depth coverage
September 29, 2020
Organizations handle vulnerability management in various ways, from training and best-practice implementations to filtering out all but the most dangerous threats. Here's a look at some of today's more innovative solutions. Read more â¶
Nowâs your time to become recognized as a globally respected cloud expert with the (ISC)2 CCSP certification. To help you confidently prepare for the exam, (ISC)2 is offering a limited time discount on CCSP Self-Paced Training when bundled with your exam. Get both for only $1,094!
Ryuk ransomware hit healthcare giant UHS this weekend. Here's what you need to know about this sophisticated threat that has been targeting businesses, hospitals, government institutions and other organizations since 2018.
Researchers are making progress on a variety of approaches to strengthen encryption techniques and algorithms. Here are some of the hottest areas in cryptographic research.
Understanding human behaviors that precede malicious actions from an insider is the best way to avoid data loss or disruption, experts say.
Attackers have learned how to exploit the Zerologon vulnerability in Windows Server, potentially gaining domain admin control.
Identity theft is the use of someone else's personal information without permission, typically to conduct financial transactions. Here's what you need to know to protect yourself and your organization.