Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

Latest News

More News
Microsoft's 'Recall' Feature Draws Criticism From Privacy Advocates

Despite Microsoft's reassurances, multiple security researchers describe the technology as problematic for users and their organizations.

The SEC's SolarWinds Case: What CISOs Should Do Now

The SEC's lawsuit may take years to resolve through litigation, but here are five things CISOs should do now to protect both themselves as individuals as well as their organizations.

Seizing Control of the Cloud Security Cockpit

Much like an airplane's dashboard, configurations are the way we control cloud applications and SaaS tools. It's also the entry point for too many security threats. Here are some ideas for making the configuration process more secure.

Cybersecurity Features In-Depth: On security strategy, latest trends, and people to know. Brought to you by Mandiant.

Security Technology: Featuring news, news analysis, and commentary on the latest technology trends.

CyberArk Goes All In on Machine Identity With Venafi Deal

CyberArk's $1.54 billion agreement to buy Venafi is a sign of how human and machine identities will converge with certificate life cycle management.

Snowflake's Anvilogic Investment Signals Changes in SIEM Market

Coming on the heels of Cisco buying Splunk, Palo Alto Networks acquiring IBM's QRadar, and LogRhythm merging with Exabeam, Snowflake's investment highlights the ongoing market pressure to improve SOC tools.

SAGE Cyber Launches CISO Planning Tool

As a newly independent company, SAGE Cyber will offer a platform that helps CISOs make data-driven decisions and optimize their security defenses.

6 Facts About How Interpol Fights Cybercrime

So you think you know Interpol? Here are some key details of how this international law enforcement entity disrupts cybercrime worldwide.

China APT Stole Geopolitical Secrets From Middle East, Africa & Asia

One of China's biggest espionage operations owes its success to longstanding Microsoft Exchange bugs, open source tools, and old malware.

Chinese 'ORB' Networks Conceal APTs, Render Static IoCs Irrelevant

Mandiant warns that defenders must rethink how to thwart Chinese cyber-espionage groups now using professional "infrastructure-as-a-service" operational relay box networks of virtual private servers as well as hijacked smart devices and routers.

Breaking cybersecurity news, news analysis, commentary, and other content from around the world.