The Latest in IT Security

1

The U.S. intelligence community says that Russian-sponsored actors have been targeting defense contractors for at least the past two years and in some cases have gained access to sensitive information. In an alert released Wednesday, the FBI, National Security Agency (NSA) and Cybersecurity and Infrastructure Security Agency (CISA) said they had observed “regular targeting” of […]

Read more ...

1

Zero Trust is a term frequently touted but rarely implemented authentically by cybersecurity providers. Trend Micro Incorporated (TYO: 4704; TSE: 4704) is changing that with the full release of its risk insights capability following a beta test with 3,500 enterprises. The industry’s broadest Zero Trust risk assessment solution now forms a critical component of Trend […]

Read more ...

1

Cybercriminals have begun using malicious container images as a means to install cryptominers on enterprise networks though they can also be used as part of a supply chain attack targeting cloud native environments. The cybersecurity firm Aqua Security uncovered several supply chain attacks that use malicious container images to compromise their victims when its threat […]

Read more ...


Categories

SUNDAY, MAY 05, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments