Part 1: Five guiding principles for choosing the optimal endpoint security solution By Oleg Mogilevsky, Product Marketing Manager, Threat Prevention...
On January 7, the cloud security provider Lacework became the first cybersecurity unicorn of 2021 when it raised $525M in...
Metadata, which gives background information on pieces of data, is typically hidden. It becomes a problem when accidentally revealed. Often...
You are a penetration tester tasked with testing the wireless network of your client Brakeme SA. You are attempting to...
Jane invites her friends Alice and John over for a LAN party. Alice and John access Jane’s wireless network without...
Alice, a professional hacker, targeted an organization’s cloud services. She infiltrated the target’s MSP provider by sending spear-phising emails and...
Robin, an attacker, is attempting to bypass the firewalls of an organization through the DNS tunneling method in order to...
The expected Treasury Department lead for the Biden Administration said that cryptocurrencies were “mainly for illicit financing.” (via darknetlive.com) The...
“Pasa a la nube” ha sido la respuesta vez más común en los últimos años para abordar el problema de...
As we say goodbye to 2020 and spend time reflecting on the industry changes, reassess our workflows and procedures in...