Internet Security

Marquette Introduces Mobile Device Security Mandates for Employees
Endpoint & Device Security Marquette Introduces Mobile Device Security Mandates for Employees

In an ongoing effort to protect both its staff and the overall institution from increasingly sophisticated cyberattacks, Marquette University is advancing its rollout of new mobile device security measures. Employees of Marquette are now being required to adopt the Outlook app as the primary means

Why Is Bitdefender a Visionary in Endpoint Protection Platforms?
Endpoint & Device Security Why Is Bitdefender a Visionary in Endpoint Protection Platforms?

Bitdefender has carved a niche for itself in the cybersecurity landscape, consistently being recognized for its innovation and effectiveness. Recently, Bitdefender's designation as a Visionary in the 2024 Gartner Magic Quadrant for Endpoint Protection Platforms (EPP) has reaffirmed its leading

Why Is Identity Security Crucial for Modern Cyber Defense Strategies?
Identity & Access Management Why Is Identity Security Crucial for Modern Cyber Defense Strategies?

In recent years, identity has emerged as the primary attack vector for cybercriminals, as it is often easier for a malicious actor to exploit a user's credentials than to break through network defenses. This trend highlights the necessity for robust identity security, making it essential for

How Will Portnox's Integration with Microsoft EAM Boost Security?
Identity & Access Management How Will Portnox's Integration with Microsoft EAM Boost Security?

In a substantial move towards enhancing cybersecurity, Portnox, a leading provider of cloud-native, zero trust access control solutions, has announced the integration of Microsoft External Authentication Methods (EAM) into their Conditional Access for Applications solution. This strategic

AI Tools Enhance Malware Sophistication in Cybercriminal Attacks
Malware & Threats AI Tools Enhance Malware Sophistication in Cybercriminal Attacks

The landscape of cybersecurity is constantly shifting, with attackers and defenders locked in a perpetual arms race. A recent report from HP Inc.'s Threat Insights reveals troubling developments in this ongoing conflict: cybercriminals are now using Generative AI (GenAI) to create more

U.S. Dismantles China-Linked Botnet Threatening Critical Infrastructure
Malware & Threats U.S. Dismantles China-Linked Botnet Threatening Critical Infrastructure

In a decisive response to a significant cybersecurity threat, U.S. intelligence and security agencies have successfully neutralized a botnet operated from China. This botnet, comprising 260,000 internet-connected devices, infiltrated critical U.S. infrastructure, government operations, and academic

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later