We will continue to encounter the types of historic breaches we’ve seen in the past, like the memcached-fueled 1.3 Tbps attacks in February 2018. Learn how to protect your organization at the edge.
Cybersecurity investigator Brian Krebs put Wipro in a tough spot by bringing up a critical data breach in the midst of a quarterly earnings call. Wipro called the incident a zero-day attack and has employed a forensic investigator to probe the incident.
New tools and services will help make it easier for enterprises to manage security with Google products as well as with Amazon and in their own private clouds and applications.
Google has implemented a new method of two-factor authentication, using an Android phone as a stand-in for a hardware dongle.
CISA’s Christopher Krebs has a two-year plan for his new cybersecurity agency, with China, supply chain and 5G as top priorities.
The 116th Congress is only a few months old, but far-reaching cybersecurity bills to protect infrastructure and the supply chain, ensure election integrity, and build a security workforce are now being considered. Here’s the list.
"Any organization not running a breach detection solution (or not having performed a recent investigation) must, in this day and age, assume they're in a post-breach state."
Maybe not, says Twitter’s former CISO, but there are risks with Facebook's move from a centralized to a distributed security model in the wake of Alex Stamos's departure.