Seven Common Lateral Movement Techniques

Inside the Attacker’s Playbook: Unmasking the most common lateral movement techniques   Lateral movement techniques refer to the methods employed by attackers to move through a network, seeking to escalate privileges, access sensitive ...
TeamViewer, insider, application, insider risk, case, threat Palo Alto network IP theft

Insider Indicted for Attempting to Sabotage California Water Plant

Earlier this month, Rambler Gallo pled not guilty to charges that he attempted to sabotage the water treatment facility in Discovery Bay, California. The facility provides treatment for the water and wastewater ...
Security Boulevard

How Ransomware Spreads and How Microsegmentation Stops It

Ransomware impacts more than seven in ten companies worldwide, and understanding how ransomware spreads is critical to finding solutions to stop it  Ransomware is malicious software threat actors use to infiltrate a ...
Microsoft Lost Its Keys, Voice Cloning Scams, The Biden-Harris Cybersecurity Labeling Program

Microsoft Lost Its Keys, Voice Cloning Scams, The Biden-Harris Cybersecurity Labeling Program

In this episode, we discuss the recent Microsoft security breach where China-backed hackers gained access to numerous email inboxes, including those of several federal government agencies, using a stolen Microsoft signing key ...
quantum data scraping

Cleantech and Quantum Computing: Critical Infrastructure Cybersecurity

As cleantech becomes a bigger part of U.S. critical infrastructure, it faces a bigger risk from cyberattackers leveraging quantum attacks ...
Security Boulevard

​​The Great Google Experiment: Googlers Trapped in an Internet-Free Wonderland

| | SBN News, security
The Internet is a treacherous playground, and wouldn’t you know it, Google, the wise old seer of the digital realm, is suggesting that its employees disconnect from the very beast they helped ...

Maximizing Cybersecurity ROI

Maximizing ROI from your cybersecurity investments is key to getting the best out of your security stack  “Times being what they are,” cybersecurity investments aren’t an option anymore – they’re a necessity ...
Radware Bot Risk Scanner Safeguards Your Splunk Applications From Malicious Bots

Radware Bot Risk Scanner Safeguards Your Splunk Applications From Malicious Bots

Twenty-five percent of all internet traffic today is generated by bad bots. Unfortunately, many organizations cannot make a definitive distinction between good and bad bots. This leaves their applications vulnerable to malicious ...

The Strategic Advantage of a Multi-Layered Cybersecurity Approach

Adopting a multi-layered cybersecurity strategy has become an imperative like never before   As we all know, cybersecurity threats are becoming more sophisticated and pervasive, posing an immense challenge to businesses. Now, more ...
A Very Big Thank You

How to Stay Up on Cybersecurity Trends

Staying up on the cybersecurity trends and the things CISOs and IT security practitioners need to know for optimal protection  Six years ago, I knew very little about the world of cybersecurity, ...