Three approaches to structuring and alert processing in a SOC
How to distribute SOC tasks to tackle both the cybersecurity skills shortage and burnout.
647 articles
How to distribute SOC tasks to tackle both the cybersecurity skills shortage and burnout.
How a threat-intelligence platform helps SOC analysts.
Security evolution: The large-scale, but short-lived ransomware epidemic of 2017.
SE Labs awarded Kaspersky EDR its highest rating in independent tests based on real world attacks.
Using a recent study on hardware vulnerabilities in processors as an example, we contemplate the cost of security.
The Andariel group attacks companies with several malicious tools.
Microsoft has released patches for more than 140 vulnerabilities, some of which need to be closed as soon as possible.
A look at what experts at Kaspersky will be watching during Black Hat 2022.
New malicious campaign hunts for Discord tokens and credit card information via infected npm packages.
How things stood with information security in a galaxy far, far away — nine years before the Battle of Yavin.
The new Luna and Black Basta ransomware strains are capable of attacking Windows, Linux and VMware ESXi.
Microsoft cancels its decision to block macros by default. We discuss the cybersecurity implications for companies.
The most effective protection is increasing employees’ awareness, and it’s up to HR to maintain it.
Cyber immune gateway that can shield IoT and IIoT devices from cyberthreats.
Why the future belongs to neuromorphic processors, and how they differ from conventional processors in modern devices.
Five arguments in favor of installing security solutions on the endpoints of a small company.
Deep analysis of modern ransomware allows you to implement universal methods to counter them.
How an intern can be a threat to your organization’s cybersecurity and what you can do about it.
Queryable Encryption in the MongoDB database management system, and how it can improve data protection.