Anjuna Security’s Ayal Yogev joins Dark Reading’s Terry Sweeney at Dark Reading News Desk during RSA Conference to discuss how confidential computing will improve cloud security.
from Dark Reading https://ift.tt/VtBkTFs
via IFTTT
Anjuna Security’s Ayal Yogev joins Dark Reading’s Terry Sweeney at Dark Reading News Desk during RSA Conference to discuss how confidential computing will improve cloud security.
from Dark Reading https://ift.tt/VtBkTFs
via IFTTT
How erring on the side of privacy might ultimately save you from chasing down a virtual rendition of you doing the bidding of a scammer
The post RSA – Spot the real fake appeared first on WeLiveSecurity
from WeLiveSecurity https://ift.tt/gVHA7pt
via IFTTT
Give employees the knowledge needed to spot the warning signs of a cyberattack and to understand when they may be putting sensitive data at risk
The post Cybersecurity awareness training: What is it and what works best? appeared first on WeLiveSecurity
from WeLiveSecurity https://ift.tt/Ot6Xfq7
via IFTTT
A review of the key trends that defined the threatscape in the first four months of 2022 and what these developments mean for your cyber-defenses
The post Key insights from ESET’s latest Threat Report – Week in security with Tony Anscombe appeared first on WeLiveSecurity
from WeLiveSecurity https://ift.tt/5tCvQd1
via IFTTT
It’s been 100 days since Russia invaded Ukraine, and we look back at various cyberattacks connected to the conflict
The post 100 days of war in Ukraine: How the conflict is playing out in cyberspace appeared first on WeLiveSecurity
from WeLiveSecurity https://ift.tt/ACrTG9W
via IFTTT
A view of the T 1 2022 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts
The post ESET Threat Report T 1 2022 appeared first on WeLiveSecurity
from WeLiveSecurity https://ift.tt/I3dEvgm
via IFTTT
Compromised routers, VPNs, and NAS devices from Cisco, Citrix, Pulse, Zyxel, and others are all being used as part of an extensive cyber espionage campaign.
from Dark Reading https://ift.tt/7RsLXGc
via IFTTT
DeepSurface’s Tim Morgan joins Dark Reading’s Terry Sweeney at Dark Reading News Desk during RSA Conference to discuss how to fortify vulnerability management.
from Dark Reading https://ift.tt/y5LHXSw
via IFTTT
It only takes one successful attack to spell disaster for a company. Learn how to protect your company with this email security best practice guide.
from Dark Reading https://ift.tt/B2aqJMs
via IFTTT
Concentric AI’s Karthik Krishnan joins Dark Reading’s Terry Sweeney at Dark Reading News Desk during RSA Conference to discuss how artificial intelligence has transformed the security landscape.
from Dark Reading https://ift.tt/XA0lpJh
via IFTTT