Cybersecurity

Hacker with computer symbolizing cyberattacks against Tech Service Providers, Microsoft Okta Lapsus$

What We Know So Far About Okta, Microsoft and Lapsus$

Microsoft and Okta are investigating after Lapsus$ hacking group posts screenshots of purported security incidents.

Software Code

What Needs To Be In An SBOM?

With cybercriminals increasingly leveraging the software supply chain, SBOMs are becoming an important tool. This is what they need to include.

A digital key lock in blue light against a black background.

Technology Companies Urged To Prepare For Cyberattacks Amid Ukraine Crisis

Technology service providers that represent attractive targets to a threat actor, are being urged to implement cybersecurity protections.

Exterior of Microsoft office

Microsoft Says MFA Adoption Is Still Terribly Low

Just 22% of Microsoft Azure Active Directory customers have implemented strong identify authentication, Microsoft says in a new report.

SBOMs

New Research: SBOMs Are No Longer Optional

More than three quarters of global organizations are expecting to either produce or consume SBOMs in 2022, Linux Foundation says.

lessons from Kaseya Attack

TD SYNNEX Launches Cybersecurity Training Program

TD SYNNEX has announced a new cybersecurity training program designed to close the skills gap and upskill cybersecurity professionals.

NEISD Cyber Training room with students working on laptops. A video wall with a world map hangs behind powered by RGB Spectrum Galileo processors

RGB Spectrum Galileo Processors Power Video Walls at Cybersecurity Training Facility

RGB Spectrum Galileo video display processors powered three video walls in the classrooms of the Institute of CyberSecurity and Innovation facility.

Exterior of Microsoft office

Prioritize These January Microsoft Security Patches

The patches include fixes for several remote code execution flaws and a critical elevation of privilege bug in Active Directory.

Hacker with computer symbolizing cyberattacks against Tech Service Providers, Microsoft Okta Lapsus$

Tech Service Providers Among The Most Attacked In 2021, Cybersecurity Firm Says

Check Point says cyberattacks increased by 50% in 2021, with tech service providers among the most frequently attacked. 

A lock over a code symbolizing Log4j scanning tools

Log4j Scanning Tools Now Available for Free and Public Use

CISA, CrowdStrike, Microsoft and others have released Log4j scanning tools to help organizations find vulnerable instances of the Java logger.