How to defend against OAuth-enabled cloud-based attacks Cyber Review February 17, 2021 Recently Malwarebytes reported that the SolarWinds hackers accessed its internal emails using the same intrusion vector…
Diversity in security: How 3 organizations are making a difference—one relationship at a time Cyber Review February 16, 2021 Cybersecurity pro Michaela Barnett didn’t see people like her at DEF CON and the other security…
CSO's guide to the worst and most notable ransomware Cyber Review February 16, 2021 Ransomware has a long history, dating back to the late 1980s. Today, it’s generating billions of…
AustCyber’s merger into Stone & Chalk gets positive reaction Cyber Review February 15, 2021 AustCyber, the government-funded security advisory and technology not-for-profit, is now part of Stone & Chalk, a…
Tech Resume Library: 24 downloadable templates for IT pros Cyber Review February 15, 2021 A well-crafted resume will attract recruiters, HR pros and hiring managers, but getting it just right…
Okta CEO: Here’s where cloud identity management is headed Cyber Review February 15, 2021 Todd McKinnon founded Okta in 2009 on the outrageous notion that business user identity could be…
How ransomware negotiations work Cyber Review February 15, 2021 Ransomware has been one of the most devastating malware threats that organizations have faced over the…
DDoS explained: How distributed denial of service attacks are evolving Cyber Review February 12, 2021 What is a DDoS attack? A distributed denial of service (DDoS) attack is when an attacker,…
Inside cybersecurity’s shelfware problem Cyber Review February 11, 2021 Security tools can find their way into the enterprise arsenal in interesting ways: a CIO who…
Oldsmar cyberattack raises importance of water utility assessments, training Cyber Review February 10, 2021 On Monday, February 8, a press conference hosted by Pinellas County, Florida, sheriff Bob Gualtieri dropped…