Learn about the potential vulnerabilities of VPNs and the measures you can take to enhance your VPN security.
Learn about the potential vulnerabilities of VPNs and the measures you can take to enhance your VPN security.
A blog about NIS2 compliance.
We’ve just added an exciting new course to our online Security Onion 2.4 training catalog! It’s called “Detection Engineering with […]
The tech world has a problem: Security fragmentation. There’s no standard set of rules or even language for mitigating cyber risk used to address the growing threats of hackers, ransomware and stolen data, and the threat to data only continues to grow. President Barack Obama recognized the cyber threat in 2013, which led to his …
In April 2024, 86k records from the T2 tea store were posted to a popular hacking forum. Data included email and physical addresses, names, phone numbers, dates of birth, purchases and passwords stored as scrypt hashes.
Oxford University researchers used an approach dubbed “blind quantum computing” to connect two quantum computing entities in a way that is completely secure.
When approaching incident response in an environment you may not be very familiar with, the biggest challenge is often knowing what to look for. This is especially true when you’re facing dozens of data sources with hundreds of event types. As an incident responder, it’s your job to determine what is legitimate and what is not among a sea of activity, which is easier said than done. This blog post and its accompanying cheat sheet provide guidance on some key events of interest that can be a starting point for reviewing Google Workspace activity in the scope of an incident.
Nearly 10 million devices were infected with data-stealing malware in 2023, with criminals stealing an average of 50.9 credentials per device.
Our review methodology for password managers involves extensive research, expert analysis and first-hand experience.
Firewalls protect a network by controlling incoming and outgoing traffic. They are inserted inline across network connections and protect the […]