Sectigo Appoints Jason Scott as Chief Information Security Officer
Jason Scott has been named as the new Chief Information Security Officer (CISO) at Sectigo, a...
The Continued Strain on Election Officials: Threats, Turnover, and Challenges Ahead
The ongoing challenges faced by election officials and workers across the United States are...
Interview with Komprise Co-Founder and COO Krishna Subramanian on Unstructured Data Management and Disaster Recovery Techniques for Companies
Krishna Subramanian, the co-founder and COO of...
Boat Faces Data Breach: 7.5 Million Customers' Information Compromised
Boat, the popular Indian audio products and smartwatch producer, is facing a major data breach that...
Wells Fargo Data Breach Notification: Personal Information of Customers Exposed
Wells Fargo, one of the largest multinational banks in America, has recently notified two of...
Analyzing the Dominant MITRE ATT&CK Techniques: Command and Scripting Interpreters vs. Phishing
According to a recent report by D3 Security, two dominant MITRE ATT&CK techniques...
Unlock the Power of Feedly for Threat Intelligence: Leveraging AI Models for Proactive Security
Feedly for Threat Intelligence has revolutionized the way cybersecurity professionals gather...
UAE partners with UN Climate Security Mechanism
The United Arab Emirates (UAE) has entered into a new partnership with the United Nations Climate Security Mechanism...
Dark Web Drug Ring Leader and Associates Sentenced to Jail for Drug Trafficking Operations
Three men have been sentenced to jail time for their involvement...
Interview with Leila Powell: From Astrophysics to Data Science in Cybersecurity
Leila Powell, Lead Data Scientist at cybersecurity company Panaseer, shared insights on the crucial...