Home Industries

Industries

Why employees need counterespionage training

Two experts are concerned that employees are no match for nation-state spy services tasked with...

SOAR Is an Architecture, Not a Product

Over the past several years, the rising star of security orchestration, automation, and response (SOAR) tools keeps climbing higher. As organizations struggle to...

TurboTax Accounts Hacked And Private Information Exposed

Intuit has informed TurboTax clients that some of their private and financial information was accessed by threat actors following what seems to be...

G7 Nations Promise Decarbonization, 870 Million Covid-19 Vaccines

Slashdot reader Charlotte Web writes: The "Group of Seven" (or G7) nations are some of the world's largest economies — the U.S....

CISOs Top 100 CISOs for 2021

By: Security CurrentJune 10, 2021 Security Current and its partners are proud to be honoring the Top 100 CISOs chosen by their C-suite...

The top 6 SSH risks and how regular assessments cut danger

shifted from the office to employees' homes, companies deployed a variety of remote access capabilities and trained workers on how to use them...

Real or Fake? When Your Fraud Notice Looks Like a Phish

So I Received a Phishing Email… I recently received an email indicating my credit card number had potentially been stolen and used for fraud....
- Advertisment -

Most Read

Supply Chain Attack Conducted by Darkside Operator – E Hacking News

 Mandiant researchers have identified a supply chain attack against a CCTV provider by a Darkside ransomware gang affiliate that has been distinguished as...

Tim Cook Claims Android has 47 Times the Amount of Malware as iOS – E Hacking News

 During a live chat, Apple CEO Tim Cook stated that Android has more malware than iOS and that "sideloading" mobile software is not...

Google Releases New Framework to Prevent Software Supply Chain Attacks

As software supply chain attacks emerge as a point of concern in the wake of SolarWinds and Codecov security incidents, Google is proposing...

Can on-prem security experts make the move to the cloud?

As cloud computing grows in popularity across all use cases, cloud workloads have never been...