Network Security
Why Pentesting-as-a-Service is Vital for Business Security
Conducting regular penetration tests (pentests) is a proactive option that identifies, evaluates and mitigates risks ...
China Breaches Microsoft Cloud — Spied on US Govt. Email
Storm-0558 Brewing: Multiple Microsoft failures cause data leaks at State and Commerce depts., plus 23 other orgs ...
NETSCOUT Uses Machine Learning to Help Thwart DDoS Attacks
NETSCOUT Systems is is dynamically applying machine learning algorithms to combat distributed denial-of-service (DDoS) attacks ...
Advanced Endpoint Protection (AEP): What Are the Options?
Advanced endpoint protection, often referred to as AEP, is a comprehensive cybersecurity solution designed to protect an organization’s endpoints, such as desktops, laptops and mobile devices, from various types of cybersecurity threats ...
Contec SolarView: Critical Bug Unpatched After 14 MONTHS
PV OT: VPN PDQ! 9.8 CVSS known since May 2022—but still exploitable on 400+ net-connected OT/ICS/SCADA systems ...
AI in the SOC
AI does what humans can’t do alone, even with a SOC—defend against dynamic and progressive cyberattacks ...
‘Wagner Mercenary’ Hackers Destroy Russian Satellite Comms
Dozor-Teleport hack, vandalism and data breach. But is it a Ukrainian false flag op? ...
Applying Zero-Trust Principles: Case Studies and Lessons From the Field
The Advanced Cyber Security Center interviewed members to understand how they implemented zero-trust and what lessons they could share with others seeking to do the same. ...
Enterprises Unprepared to Defend Against MITRE ATT&CK Techniques
Enterprises lack detections for more than three-quarters of all MITRE ATT&CK techniques, while 12% of SIEM rules are broken and will never fire due to data quality issues including misconfigured data sources ...