FreshRSS

πŸ”’
❌ About FreshRSS
There are new available articles, click to refresh the page.
Before yesterdayYour RSS feeds

Securing Your Move to the Hybrid Cloud

By Infosec Contributor
Infosec expert Rani Osnat lays out security challenges and offers hope for organizations migrating their IT stack to the private and public cloud environments.

Securing Your Move to the Hybrid Cloud

By Infosec Contributor
Infosec expert Rani Osnat lays out security challenges and offers hope for organizations migrating their IT stack to the private and public cloud environments.

Why Physical Security Maintenance Should Never Be an Afterthought

By Infosec Contributor
SecuriThings' CEO Roy Dagan tackles the sometimes overlooked security step of physical security maintenance and breaks down why it is important.

Why Physical Security Maintenance Should Never Be an Afterthought

By Infosec Contributor
SecuriThings' CEO Roy Dagan tackles the sometimes overlooked security step of physical security maintenance and breaks down why it is important.

Conti’s Reign of Chaos: Costa Rica in the Crosshairs

By Aamir Lakhani
Aamir Lakhani, with FortiGuard Labs, answers the question; Why is the Conti ransomware gang targeting people and businesses in Costa Rica?

Conti’s Reign of Chaos: Costa Rica in the Crosshairs

By Aamir Lakhani
Aamir Lakhani, with FortiGuard Labs, answers the question; Why is the Conti ransomware gang targeting people and businesses in Costa Rica?

How War Impacts Cyber Insurance

By Infosec Contributor
Chris Hallenbeck, CISO for the Americas at Tanium, discusses the impact of geopolitical conflict on the cybersecurity insurance market.

Rethinking Vulnerability Management in a Heightened Threat Landscape

By Infosec Contributor
Find out why a vital component of vulnerability management needs to be the capacity to prioritize from Mariano Nunez, CEO of Onapsis and Threatpost Infosec Insiders columnist.

How War Impacts Cyber Insurance

By Infosec Contributor
Chris Hallenbeck, CISO for the Americas at Tanium, discusses the impact of geopolitical conflict on the cybersecurity insurance market.

Rethinking Vulnerability Management in a Heightened Threat Landscape

By Infosec Contributor
Find out why a vital component of vulnerability management needs to be the capacity to prioritize from Mariano Nunez, CEO of Onapsis and Threatpost Infosec Insiders columnist.

A Guide to Surviving a Ransomware Attack

By Oliver Tavakoli
Oliver Tavakoli, CTO at Vectra AI, gives us hope that surviving a ransomware attack is possible, so long as we apply preparation and intentionality to our defense posture.

A Guide to Surviving a Ransomware Attack

By Oliver Tavakoli
Oliver Tavakoli, CTO at Vectra AI, gives us hope that surviving a ransomware attack is possible, so long as we apply preparation and intentionality to our defense posture.

Top Six Security Bad Habits, and How to Break Them

By Infosec Contributor
Shrav Mehta, CEO, Secureframe, outlines the top six bad habits security teams need to break to prevent costly breaches, ransomware attacks and prevent phishing-based endpoint attacks.

Top Six Security Bad Habits, and How to Break Them

By Infosec Contributor
Shrav Mehta, CEO, Secureframe, outlines the top six bad habits security teams need to break to prevent costly breaches, ransomware attacks and prevent phishing-based endpoint attacks.

Gamification of Ethical Hacking and Hacking Esports

By Joseph Carson
Joseph Carson, Chief Security Scientist and Advisory CISO at Delinea, explores why gamified platforms and hacking esports are the future.

Gamification of Ethical Hacking and Hacking Esports

By Joseph Carson
Joseph Carson, Chief Security Scientist and Advisory CISO at Delinea, explores why gamified platforms and hacking esports are the future.

Ransomware Risk in Healthcare Endangers Patients

By Ryan Witt
Ryan Witt, Proofpoint's Healthcare Cybersecurity Leader, examines the impact of ransomware on patient care.

Ransomware Risk in Healthcare Endangers Patients

By Ryan Witt
Ryan Witt, Proofpoint's Healthcare Cybersecurity Leader, examines the impact of ransomware on patient care.

Taming the Digital Asset Tsunami

By Rob N. Gurzeev
Rob Gurzeev, CEO and Co-Founder of CyCognito, explores external attack surface soft spots tied to an ever-expanding number of digital assets companies too often struggle to keep track of and manage effectively.

Taming the Digital Asset Tsunami

By Rob N. Gurzeev
Rob Gurzeev, CEO and Co-Founder of CyCognito, explores external attack surface soft spots tied to an ever-expanding number of digital assets companies too often struggle to keep track of and manage effectively.

Cyber Risk Retainers: Not Another Insurance Policy

By Matt Dunn
The costs associated with a cyberattack can be significant, especially if a company does not have an Incident Response plan that addresses risk.

Cyber Risk Retainers: Not Another Insurance Policy

By Matt Dunn
The costs associated with a cyberattack can be significant, especially if a company does not have an Incident Response plan that addresses risk.

Cybercriminals Expand Attack Radius and Ransomware Pain Points

By Threatpost
Melissa Bischoping, security researcher with Tanium and Infosec Insiders columnist, urges firms to consider the upstream and downstream impact of "triple extortion" ransomware attacks.

Cybercriminals Expand Attack Radius and Ransomware Pain Points

By Threatpost
Melissa Bischoping, security researcher with Tanium and Infosec Insiders columnist, urges firms to consider the upstream and downstream impact of "triple extortion" ransomware attacks.

Zero Trust for Data Helps Enterprises Detect, Respond and Recover from Breaches

By Threatpost
Mohit Tiwari, CEO of Symmetry Systems, explores Zero Trust, data objects and the NIST framework for cloud and on-prem environments.

Zero Trust for Data Helps Enterprises Detect, Respond and Recover from Breaches

By Threatpost
Mohit Tiwari, CEO of Symmetry Systems, explores Zero Trust, data objects and the NIST framework for cloud and on-prem environments.

Closing the Gap Between Application Security and Observability

By Threatpost
Daniel Kaar, global director application security engineering at Dynatrace, highlights the newfound respect for AppSec-enabled observability in the wake of Log4Shell.β€―

Closing the Gap Between Application Security and Observability

By Threatpost
Daniel Kaar, global director application security engineering at Dynatrace, highlights the newfound respect for AppSec-enabled observability in the wake of Log4Shell.β€―

You Can’t Eliminate Cyberattacks, So Focus on Reducing the Blast Radius

By Tony Lauro
Tony Lauro, director of security technology and strategy at Akamai, discusses reducing your company's attack surface and the "blast radius" of a potential attack.

You Can’t Eliminate Cyberattacks, So Focus on Reducing the Blast Radius

By Tony Lauro
Tony Lauro, director of security technology and strategy at Akamai, discusses reducing your company's attack surface and the "blast radius" of a potential attack.

CANs Reinvent LANs for an All-Local World

By David Canellos
A close look at a new type of network, known as a Cloud Area Network.

CANs Reinvent LANs for an All-Local World

By David Canellos
A close look at a new type of network, known as a Cloud Area Network.

Bad Actors Are Maximizing Remote Everything

By Aamir Lakhani
Aamir Lakhani, global security strategist and researcher at FortiGuard Labs, zeroes in on how adversaries are targeting 'remote everything'.

Bad Actors Are Maximizing Remote Everything

By Aamir Lakhani
Aamir Lakhani, global security strategist and researcher at FortiGuard Labs, zeroes in on how adversaries are targeting 'remote everything'.
❌