Laden...
The day's top cybersecurity news and in-depth coverage
November 22, 2022
Putting on a red hat and trying to understand the motivations, expectations, behaviors, and goals of bad actors can be a key part of a solid cybersecurity plan. Read more â¶
Itâs a familiar tipping point faced by many mid-sized organizations: how to manage growth securely, profitably and efficiently. We reached out to a group of tech influencers to explore how these SMBs can manage this critical growth phase, while balancing the need for security.
New research from DigiCert has found that digital trust is a key driver of customer loyalty, with 84% of customers saying they would consider leaving a vendor that did not manage digital trust.
A broad range of vendors means a broad range of security issues to understand and assess. But three Android vendors meet the highest security standards â and one should be avoided.
Security teams must update their security incident reporting policies and processes to account for remote work or risk exposure to increased threats.
Palo Altoâs Unit 42 investigated several incidents linked to the Luna Moth callback phishing extortion campaign that uses legitimate and trusted management tools instead of malware to exploit businesses.
API-focused Noname Security launched an attack simulator designed to feign an external, malicious attack.
© 2024