The day's top cybersecurity news and in-depth coverage
June 14, 2021
Each cloud platform differs in the security tools and features it offers customers to help them protect their cloud assets. Read more â¶
In evaluating SaaS-based email encryption solutions, specialty distributor Rain Networks recognized that Trustifi's relay-based cyber security was a breakthrough approach. It turned out to be a disruptive enough strategy to cause MSPs to rethink how they handle email encryption all together.
Roughly 115 cybersecurity-related bills are working their way through the legislative process, in many cases with bipartisan support.
After operating under other names, Fancy Lazarus has fine-tuned its DDoS extortion campaigns, although with mixed results.
With flexibility comes confusion, misconfiguration, and exposure, researchers say.
As two-factor authentication becomes more widespread, criminals seek novel ways to subvert it. Here's what you need to know.
The shared responsibility model (SRM) delineates what you, the cloud customer is responsible for, and what your cloud service provider is responsible for.
Every Windows network admin can improve their security posture by focusing on these six basic areas.