Laden...
The day's top cybersecurity news and in-depth coverage
June 08, 2020
Using a software-as-a-service provider means giving up some control over security, so close vetting of SaaS security during vendor evaluation is critical. Read more â¶
Even as enterprise spending on cybersecurity tools and products has skyrocketed in recent years, cybercrime continues to run rampant, and shows no signs of slowing down.
An initiative more than a technology, XDR seeks to simplify and unify security technologies to make the whole greater than the sum of its parts.
Abandoned domain names are low-hanging fruit for attackers, who can use them to access sensitive email or customer data.
Join Zones and our strategic partner, Cisco, to learn how to confidently secure every business endeavor with an open, integrated platform that scales to meet your security needs.
CISOs are looking ahead to see how their security organizations need to work post-COVID. Here's what they expect.
In this guide, weâll look at five key AppSec best practices and discuss the practical steps you can take immediately to get the ball rolling in each of these areas.
Some organizations have still not implemented an Office patch from 2012. Attackers know this and are exploiting the vulnerability.
Crafty hackers, unwitting users, a relentless workload â working in IT security is all about accepting this as business as usual and pushing forward anyway.
© 2024