newsEncrochat bust leads to 6,500 arrests, seizure of $1B in assetsAn international investigation intercepted and analyzed over 115 million conversations that took place over the encrypted messaging platform among more than 60,000 users. By Apurva Venkat28 Jun 20234 minsCommunications SecurityCybercrime feature Living-off-the-land attacks are hard, but not impossible, to protect againstBy Susan Bradley28 Jun 20236 minsSoftware ProvidersWindows SecurityNetwork Securitynews analysis Less than half of UK banks implement most secure DMARC levelBy Michael Hill27 Jun 20233 minsEmail SecurityFinancial Services Industry news analysisCritical flaw in VMware Aria Operations for Networks sees mass exploitationBy Lucian Constantin 26 Jun 20233 minsCyberattacksNetwork SecurityVulnerabilities featureHybrid Microsoft network/cloud legacy settings may impact your future security postureBy Susan Bradley 22 Jun 20237 minsActive DirectoryWindows SecurityCloud Security news analysisMicrosoft Office 365 AitM phishing reveals signs of much larger BEC campaignBy Lucian Constantin 14 Jun 20235 minsPhishingEmail SecurityCybercrime news analysisBusiness email compromise scams take new dimension with multi-stage attacksBy Lucian Constantin 12 Jun 20236 minsEmail SecurityCyberattacksCybercrime news analysisNorth Korean APT group targets email credentials in social engineering campaignBy Lucian Constantin 08 Jun 20234 minsAdvanced Persistent ThreatsEmail SecuritySocial Engineering newsGuardz releases AI-powered phishing protection solution for SMEs, MSPsBy Michael Hill 08 Jun 20233 minsPhishingEmail SecurityGenerative AI Articlesfeature7 VPN alternatives for securing remote network accessVirtual private networks have shortcomings when it comes to protecting remote network connections. These technologies can replace or supplement it.By Michael Hill 09 May 2023 13 minsRemote Access SecurityNetwork SecurityfeatureReview your on-prem ADCS infrastructure before attackers do it for youAttacks through Active Directory Certificate Services are fairly easy for bad actors to perform but basic vigilance and built-in Windows protections can help mitigate the risk of a breach. By Susan Bradley 08 May 2023 6 minsSmall and Medium BusinessActive DirectoryWindowsnewsoneM2M IoT security specifications granted ITU approvalThe oneM2M specifications enable secure IoT data exchange and information interoperability across different vertical sectors, service providers, and use cases.By Michael Hill 03 May 2023 4 minsInternet of ThingsNetwork SecurityTelecommunicationsnews analysisCisco patches high and critical flaws across several productsLeft unmitigated, the vulnerabilities could lead to unauthorized remote access, denial of service attacks, or privilege escalation.By Lucian Constantin 21 Apr 2023 4 minsNetwork SecurityVulnerabilitiesnewsRussian cyber spy group APT28 backdoors Cisco routers via SNMPThe spy agency has been exploiting an old vulnerability that allows bad actors to gain access through simple network management protocol credentials.By Lucian Constantin 19 Apr 2023 6 minsCyberattacksData and Information SecurityNetwork Securitynews analysisCISA updates zero trust maturity model to provide an easier launchThe Cybersecurity and Infrastructure Security Agency updated its Zero Trust Maturity Model to include a new stage that could make it easier for organizations to transition to a zero-trust architecture.By Cynthia Brumfield 17 Apr 2023 6 minsZero TrustGenerative AINetwork SecuritynewsCyberpion rebrands as Ionix, offering new EASM visibility improvementsIonix is adding a suite of new features to help extend the visibility of interconnected assets and deliver risk-based prioritization. By Shweta Sharma 24 Mar 2023 3 minsRemote Access SecurityThreat and Vulnerability ManagementNetwork SecuritynewsDeveloped countries lag emerging markets in cybersecurity readinessOrganizations in Asia-Pacific countries including Indonesia, the Philippines, Thailand, and India are generally more prepared for cyberattacks than their peers in more economically developed nations, according to a new Cisco report. By Apurva Venkat 21 Mar 2023 4 minsData and Information SecurityEndpoint ProtectionIdentity and Access Managementfeature9 attack surface discovery and management toolsThe main goal of cyber asset attack surface management tools is to protect information about a company’s security measures from attackers. Here are 9 tools to consider when deciding what is best for the business.By Tim Ferrill 21 Mar 2023 8 minsRemote Access SecurityThreat and Vulnerability ManagementData and Information Securityhow-toWhat is zero trust? A model for more effective securityAs the security model becomes the preferred security strategy, it’s worth looking at what it is and what it takes to achieve.By Mary K. Pratt 07 Mar 2023 8 minsAccess ControlIdentity Management SolutionsNetwork SecuritynewsHPE to acquire Axis Security to deliver a unified SASE offeringHPE plans to expand its Aruba SASE platform with Axis Security’s Atmos, delivering a comprehensive edge-to-cloud, network and security solution as a service. By Shweta Sharma 03 Mar 2023 3 minsCloud SecurityNetwork Securitynews analysisBackdoor deployment overtakes ransomware as top attacker actionThanks to the availability of malware such as Emotet, deploying backdoors on victims' networks is becoming easier and more lucrative for cybercriminals.By Samira Sarraf 22 Feb 2023 7 minsRansomwareCyberattacksMalware Show more Show less View all Resources whitepaper Breakthrough with Modern Security: How CIOs Can Enhance Cyber Resilience The recent rapid acceleration of digital transformation and distributed work has changed the game in cybersecurity. When most employees worked exclusively from an office, the boundaries for cybersecurity were clearer. The post Breakthrough with Modern Security: How CIOs Can Enhance Cyber Resilience appeared first on Whitepaper Repository. By Dell Technologies 18 May 2023Cloud SecurityCybercrimeSecurity whitepaper Data Protection in a Multicloud World By Dell Technologies 18 May 2023Cloud SecurityData and Information SecurityMulti Cloud whitepaper Top reasons why customers choose Dell VxRail By Dell Technologies 18 May 2023Infrastructure ManagementIT ManagementSystem Management View all Video on demand videoGet up to speed on SASE: What's driving demand and how providers' capabilities differAs enterprises build up their mobile, edge and cloud deployments, they’re being challenged to deliver a more efficient, scalable network-security architecture. Secure access service edge (SASE) is the convergence of security and networking in a cloud-delivered model. Learn what’s driving demand for SASE, how SASE providers’ capabilities differ, and the skills companies need to get started. 15 Oct 2021 26 minsSASENetwork SecuritySecurity WAN evolution: From SD-WAN to Secure Access Service Edge (SASE) 25 Jun 2021 31 minsSASESD-WANNetwork Security How have network firewalls evolved? 30 Apr 2018 FirewallsNetwork MonitoringNetwork Security Is it time to kill the pen test? | Salted Hash Ep 22 18 Apr 2018 12 minsHackingNetwork MonitoringCybercrime See all videos Explore a topic Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Physical Security Privacy Risk Management Security View all topics All topics Close Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Physical Security Privacy Risk Management Security Security Infrastructure Software Development Vulnerabilities Generative AI Show me morePopularArticles opinion What is the dark web? How to access it and what you'll find By Darren Guccione 01 Jul 202111 mins Data BreachTechnology IndustryCybercrime