Only one-third of organizations feel their processes for third-party risk management are effective. The root of the issue lies in visibility and ineffective process.
Hackers today are more sophisticated and coordinated than the dark, hooded figures often portrayed in movies. Threat hunting is critical to spot threats before they cause damage on the network.
Researchers published two pieces of exploit code that can allow anyone to interact with an organization's SAP enterprise resource planning platform and perform unauthorized transactions.
A threat actor known as TA505 recently launched a phishing campaign that uses living-of-the-land binaries (LOLBins) to distribute a new backdoor malware.
As facial recognition technology advances, bad actors will have more biometric data with which to create deepfake images, videos, sounds and more. Is the security community prepared for this threat?
Effective threat management requires security teams to combine various sources of security analytics with machine-generated data to investigate incidents with speed and accuracy.
Before the first round of the Ukraine election in March, we decided that we couldn't afford to sit on our heels until an attack was launched.
Like the video game industry, security has shifted toward unified platforms, and contextual threat intelligence is the cheat code SOC teams need to defeat the bosses standing in the way of security.
A recent Ponemon study revealed a set of habits and practices that the most cyber resilient organizations undertake, such as adopting automation.
Basic cyber hygiene only goes so far. Organizations need immersive cyber fitness training to make better decisions in the face of crisis situations.