Read more about the U.S. Department of Justice and Microsoft’s efforts to interrupt the activities of Russian-based threat actor Star Blizzard, and learn how to protect from this threat.
Penetration testing is one of the best ways to proactively protect a cloud system. Read below to learn how it works and why it’s important in a cloud environment.
Cisco Talos observed the TTPs used by 14 of the most prevalent ransomware groups based on their volume of attack, impact to customers and atypical behavior.
This new report also indicates an increasing attack surface as putting pressure on CISOs. One positive note is CISOs' improving relationships with board members.