DDoS threats and defense: How certain assumptions can lead to an attack

The assumptions a business shouldn’t make about its DDoS defenses and the steps it should take now to reduce its likelihood of attack. Image: iStockphoto/stevanovicigor Jump to: A website without high traffic... Read more »

Cisco LIVE 2023: AI and security platforms innovations take center stage 

Image: Cisco Organizations worldwide are dealing with short-staffed security operations, and a security parasol that stitches together numerous single-point solutions and hampers threat visibility. At its LIVE 2023 event in Las Vegas... Read more »

Verizon 2023 DBIR: DDoS attacks dominate and pretexting lead to BEC growth

In Verizon’s just-released 2023 Data Breach Investigations Report, money is king, and denial of service and social engineering still hold sway. Image: Ar_TH /Adobe Stock Verizon’s just-released 2023 Data Breach Investigations Report... Read more »

Google launches passkeys for Workspace

Image: faithie/Adobe Stock Google validated the virtues of passkey authentication technology on Monday with an open beta version of passkey access that allows people and organizations around the world to sign into... Read more »

Improve your app security on Azure

Image: PhotoGranary/Adobe Stock When cloud computing first became popular, it was seen as a way of reducing both friction and costs. It was much faster and cheaper to spin up a virtual... Read more »

1Password enables passkeys — a new option from passwords

Identity management company 1Password is spinning up a pair of new features that constitute a major shift away from passwords and toward their low-friction replacement: passkeys. Image: 1Password On June 6, 1Password... Read more »

Most people are aware of their data trails, but few know how to deal with it: Okta study

A new study by Okta finds that a proliferation of active accounts and web identities is exacerbating security risks both for individuals and enterprises. Image: Bussarin/Adobe Stock Many individuals do not know... Read more »

Threatening botnets can be created with little code experience, Akamai finds

Researchers at Akamai’s Security Intelligence unit find a botnet specimen that reveals how successful DDoS, spam and other cyberattacks can be done with little finesse, knowledge or savvy. Image: iStock/bagotaj Botnets, especially... Read more »

Microsoft warns of Volt Typhoon, latest salvo in global cyberwar

Image: pinkeyes/Adobe Stock Microsoft’s warning on Wednesday that the China-sponsored actor Volt Typhoon attacked U.S. infrastructure put a hard emphasis on presentations by cybersecurity and international affairs experts that a global war... Read more »

WithSecure launches ‘outcome-based’ security at Sphere23 conference

At its Sphere23 event in Finland, security company WithSecure unveiled offerings focused on collaboration, business goals and outcomes. Image: Getty Images/iStockphoto The WithSecure Sphere conference in Helsinki, Finland, kicked off with a... Read more »