We reported on the highly sophisticated FireEye breach last December. In the attack, the criminals targeted and accessed certain FireEye Red Team assessment tools which are used to mimic the [...]
This is part 2 in our series on Zero-trust Security. For part 1 and a high-level overview of zero trust, check out What is Zero-Trust Security. Based on a survey of security decision-makers [...]
The threat landscape is evolving and has greatly expanded over the past ten to fifteen years. IT environments used to traditionally consist of an office where all employees, servers, and maybe [...]
Cybersecurity gains more attention as top White House officials recently held a joint meeting with CEOs of the nation’s largest companies including Amazon, Apple, Microsoft, Google, IBM, [...]