Five ways to mitigate insider risks during layoffs
Here are five tips for staying vigilant as staff leave the company and take company secrets with them. Article Link:...
Here are five tips for staying vigilant as staff leave the company and take company secrets with them. Article Link:...
Here’s a look at the most interesting products from the past week, featuring releases from Dashlane, Immersive Labs, Intruder, Private...
CERT-UA (Ukrainian Government Computer Emergency Response Team) recently reported that the Ukrainian state networks suffered a cyber attack attributed to...
Satori released Universal Data Permissions Scanner, a free, open-source tool that enables companies to understand which employees have access to...
Check Point Research has recently published a study revealing the discovery of a previously unknown malware variant dubbed FluHorse. The...
Cyber-risk levels have improved from “elevated” to “moderate” for the first time, but insiders represent a persistent threat for global...
In the first quarter of 2023 there was a significant increase in cyberattacks exploiting trust in established tech brands Microsoft...
Pot, meet kettle, both containing weak sauce The National Computer Virus Emergency Response Center of China and local infosec outfit...
Article Link: https://isc.sans.edu/diary/rss/29812 1 post - 1 participant Read full topic
The U.S. government this week put a $10 million bounty on the head of a Russian man who for the...