Security
Headlines
HeadlinesLatestCVEs

Source

DARKReading

The 5 Phases of Zero Trust Adoption

Zero trust aims to replace implicit trust with explicit, continuously adaptive trust across users, devices, networks, applications, and data.

DARKReading
The 5 Phases of Zero-Trust Adoption

Zero trust aims to replace implicit trust with explicit, continuously adaptive trust across users, devices, networks, applications, and data.

Applying Behavioral Psychology to Strengthen Your Incident Response Team

A deep-dive study on the inner workings of incident response teams leads to a framework to apply behavioral psychology principles to CSIRTs.

Continuous Authentication Tech Looms Large in Deployment Plans

Security leaders are interested in continuous authentication technologies, especially behavioral-based capabilities.

North American Orgs Hit With an Average of 497 Cyberattacks per Week

A new analysis confirms a surge in global cyberattacks since the COVID-19 pandemic began.

'FontOnLake' Malware Family Targets Linux Systems

Researchers report that the location of its C2 server and the countries where samples were uploaded may indicate targets include Southeast Asia.

71% of Security Pros Find Patching to be Complex and Time Consuming, Ivanti Study Confirms

Challenges with lack of time and vulnerability and patching prioritization are putting organizations at increased risk of cyberattacks.

Patch 'Immediately': Apache Issues Software Fix Amid Zero-Day Attacks

CISA reports it's seeing ongoing scanning for the flaws and expects the activity to accelerate.

Hardware Bolsters Medical Device Security

New microprocessor technologies like secure enclaves and cryptography acceleration enable hardware to better safeguard medical devices.

Microsec.ai Launches Solution to Deliver Agentless Runtime Protection for Multi-cloud Infrastructure as a Service

Continuous monitoring of network traffic, data loss prevention, and responsive self-healing protection from threats to cloud-native applications.