IT Asset Disposal Is A Security Risk CISOs Need To Take Seriously
Asset disposal normally isn’t one of those burning topics that is top-of-mind for CISOs, yet every CISO must be able…
Asset disposal normally isn’t one of those burning topics that is top-of-mind for CISOs, yet every CISO must be able…
It used to be just the admin accounts, the root access, and the DBA accounts that needed were considered privileged….
The Sophos Rapid Response team has compiled a list of the most commonly held security misperceptions they’ve encountered in the…
Cyber attackers are becoming more brazen by the day. Recently, Australian and North American units of the world’s largest meat…
What is credential stuffing? Credential stuffing is the automated use of collected usernames and passwords to gain fraudulent access to…
Sophos has released the “Active Adversary Playbook 2021,” detailing attacker behaviors and the tools, techniques and procedures (TTPs) that Sophos’…
CSO definition A CSO is a departmental leader responsible for information security, corporate security or both. That’s the simplest answer…
Sophos has identified a stash of 167 counterfeit Android and iOS apps that attackers are using to steal money from…
Capping a dramatic week that saw major US oil pipeline provider Colonial Pipeline crippled by a ransomware attack, the Biden…
SE Labs, a leading independent cybersecurity testing company that seeks to improve information technology security by assessing products and services…
No more posts available. Thank you for scrolling this far.
No more posts available. Thank you for scrolling this far.