Internet Security

SEC Fines Check Point, Mimecast, Unisys, Avaya for SolarWinds Hack Disclosures
Infrastructure & Network Security SEC Fines Check Point, Mimecast, Unisys, Avaya for SolarWinds Hack Disclosures

The US Securities and Exchange Commission (SEC) has taken enforcement actions against four companies for inadequate disclosures related to the SolarWinds hack. Check Point, Mimecast, Unisys, and Avaya are accused of failing to fully inform investors and the public about the impact of the hack,

How Does Falcon Foundry Simplify Custom Security App Development?
Infrastructure & Network Security How Does Falcon Foundry Simplify Custom Security App Development?

In today's rapidly evolving cybersecurity landscape, the ability to quickly and efficiently develop custom security applications is critical. CrowdStrike Falcon Foundry emerges as a pioneering solution, offering a low-code application platform that enables Security Operations Centers (SOCs) to

Cisco's Public DevHub Breach Highlights Growing Cybersecurity Risks
Data Protection & Privacy Cisco's Public DevHub Breach Highlights Growing Cybersecurity Risks

In a significant cybersecurity incident, the tech giant Cisco recently fell victim to a breach involving its public DevHub environment. The hacker known as IntelBroker claimed responsibility, purporting to have acquired sensitive data not just from Cisco, but also from other major corporations like

How Safe Are API Tokens? Insights From Cisco's DevHub Data Breach
Data Protection & Privacy How Safe Are API Tokens? Insights From Cisco's DevHub Data Breach

The recent incident involving Cisco's DevHub portal has raised critical questions about the security of API tokens, which are instrumental in various digital interactions. Last week, Cisco had to take down its DevHub portal following a data breach orchestrated by the known threat actor

Are Third-Party Partnerships Creating Cybersecurity Vulnerabilities?
Infrastructure & Network Security Are Third-Party Partnerships Creating Cybersecurity Vulnerabilities?

In an increasingly interconnected world where organizations rely significantly on third-party partnerships, the recent cyberattack targeting Israeli firms has illuminated unforeseen vulnerabilities within these alliances. The attack utilized phishing emails that masqueraded as alerts from the

Is Norton Secure VPN a Worthwhile Standalone or Better with 360 Suite?
Infrastructure & Network Security Is Norton Secure VPN a Worthwhile Standalone or Better with 360 Suite?

Norton Secure VPN is a product well-known in the cybersecurity market, often bundled with the comprehensive Norton 360 suite. However, questions arise whether this VPN stands strong on its own or if it is better suited as part of a larger security package. This article explores the key features,

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later