As modern networks stretch well beyond the data center, vulnerabilities are being exploited more and more by threat actors. Much like a rubber band, as...
The development of increasingly powerful and sophisticated IT security tools to defend against cyberattacks can be described as an arms race—with public and private sector...
As in past years, financially motivated attacks continue to be the most common, likewise, actors categorized as “organized crime” continue to be the top threat...
In early October, two major outages related to DNS configuration changes affected the customer experience for the users of digital giants, Slack and Facebook. The...
A recently discovered vulnerability in the Java logging utility Log4J (CVE-2021-44228)1 enables remote code execution exploits in a variety of common software. This happens through...
COVID-19 has fundamentally changed traditional labor models and employment conditions. Many 9-5 office workers, having proved they can be just as productive working from home,...
It seems that the term “zero-trust” is emerging as the latest buzzword in network security and cybersecurity communities. To explain it, one can look to...