
Image: Ar_TH/Adobe Stock Last year, attacks using vulnerabilities in applications and application protocol interfaces reached record highs, according to security company Akamai in its new State of the Internet report. The firm... Read more »

Image: JHVEPhoto/Adobe Stock At the RSA Conference, IBM launched a platform-centric expansion to its QRadar security product, designed as a one-stop shop to accelerate response and offer a unified framework for security... Read more »

Cisco took the stage at RSA 2023 to tout extended detection and response as key to a unified cross-domain security platform, plus new Duo MFA features. Image: Tobias Arhelger/Adobe Stock Day one... Read more »

July 30, 2019 Santa Clara / CA / USA – Akamai sign displayed at their headquarters in Silicon Valley; Akamai Technologies, Inc. is an American content delivery network (CDN) and cloud service... Read more »

Jack Wallen shows you how to create a team and add users in Portainer in a secure way. [embedded content] Portainer is a great container management GUI that makes developing and managing... Read more »

Image: Adobe Stock/WunderBild Cloud-focused credential harvester and spam utilities, used to illicitly extract an organization’s database of usernames, passwords and emails, are on the rise. By some estimates, over 24 billion credentials... Read more »

Image: Google Open source software and software supply chain security risks continue to be a primary concern for developers and organizations. According to a 2022 study by electronic design and automation company... Read more »

Image: Sundry Photography/Adobe Stock As has been widely documented, distributed denial of service, or DDoS, attacks rose precipitously last year. A microcosm of this upward trend involved exploits targeting public information sites... Read more »

Image: CROCOTHERY/Adobe Stock In Cisco’s new Cybersecurity Readiness Index, only 15% of respondents to the global survey said their organizations have implemented security programs mature enough to defend against current cybersecurity risks.... Read more »

A look at 4th quarter 2022, data suggests that new threat surfaces notwithstanding, low-code cybersecurity business email compromises including phishing, as well as MFA bombing are still the prevalent exploits favored by... Read more »