The Latest

  • A lit Microsoft log seen above a group of people in shadow.
    Image attribution tooltip
    Jeenah Moon via Getty Images

    Microsoft taps security demand to drive M365 amid fragmented market

    A top company executive said a key driver is to bundle its cybersecurity capabilities with office productivity applications, as customers look to consolidate vendors.

  • A square with an arrow extending from the center.
    Image attribution tooltip
    Permission granted by Gartner
    Sponsored by Gartner Peer Insights

    The State of Digital Leadership

    Gartner Peer Insights data and opinion explores: 'Are you a good digital leader?'

  • Rendered image depicting global networks.
    Image attribution tooltip
    DKosig via Getty Images

    Rackspace says ransomware disrupted its Hosted Exchange business

    The incident could lead to further interruptions and a loss of revenue at its Hosted Exchange business, the company warned. 

  • Lights in Europe are seen from space.
    Image attribution tooltip
    DKosig/iStock via Getty Images

    Ransomware attacks shift beyond US borders

    U.S.-based organizations remain the top target for ransomware gangs, but the scale of that misfortune is waning, according to Moody’s.

  • A depiction of computer hardware.
    Image attribution tooltip
    solarseven via Getty Images

    Infostealer malware surges on dark web amid rise in MFA fatigue attacks

    Lapsus$, one of the most prolific ransomware actors of 2022, has utilized such tactics to breach a number of high-profile organizations.

  • Group of people working in a modern board room with augmented reality interface, all objects in the scene are 3D.
    Image attribution tooltip
    piranka via Getty Images

    7 of this year’s biggest cybersecurity stories

    From vendor evolution to the long-term effects of high-profile attacks, the cybersecurity industry is rapidly evolving. Take a look at our top stories to understand just how much has changed.

  • Digital technology vector background depicting a cyberattack.
    Image attribution tooltip
    WhataWin via Getty Images

    Cuba ransomware group hitting US organizations in 5 critical sectors

    The group and its affiliates have shifted tactics in 2022. Top targets include organizations in finance, government, healthcare, manufacturing and IT.

  • A man in a suit stands behind a chair while holding its back.
    Image attribution tooltip
    Chip Somodevilla via Getty Images

    Cyber Safety Review Board to probe Lapsus$ ransomware spree

    Following an inaugural review of Log4j, the board will investigate the threat actor’s prolific campaign of cyber extortion against major companies, including Uber, T-Mobile and Nvidia.

  • AWS CEO Adam Selipsky
    Image attribution tooltip
    Noah Berger / Stringer via Getty Images

    AWS builds a lake for multivendor security data sharing

    Security data is scattered and often stored in fragments from multiple sources. AWS wants to centralize that in a single data lake.

  • A photo illustration of LastPass logos on a hard drive disk held in someone's hand.
    Image attribution tooltip
    Leon Neal via Getty Images

    LastPass breach fallout spreads to expose customer data

    Details are scant but since the breach is a continuation from an attack on the company’s development system, “the keys to the kingdom” might be in the wrong hands, one expert said.

  • Uncut sheet of U.S. $100 bills
    Image attribution tooltip
    eranicle/iStock via Getty Images

    CrowdStrike CEO: SMB deals delayed as enterprises hold firm on cyber spend

    Fears of a recession are impacting the cybersecurity investments of smaller organizations and enterprises in different ways, George Kurtz said.

  • A sign is posted in front of a Walmart store on November 16, 2021 in American Canyon, California.
    Image attribution tooltip
    Justin Sullivan via Getty Images

    Walmart security, operating at a vast scale, turns to automation

    Security operations centers, part of Walmart Global Tech, process 6 trillion data points each year, a feat unattainable through manual methods. 

  • AWS CEO Adam Selipsky
    Image attribution tooltip
    Noah Berger/Getty Images via Getty Images

    AWS CEO stresses the core elements of cloud security

    Adam Selipsky described security as a prerequisite for organizations to trust cloud infrastructure. And for that, he claimed, AWS is the best in the game.

  • Bright AWS signage hangs over a trade show floor, attendees walking by in the foreground
    Image attribution tooltip
    Noah Berger/Getty Images for Amazon Web Services via Getty Images
    Deep Dive

    Where is AWS in the cybersecurity conversation?

    The cloud leader doesn’t emphasize security and share information at the same level as its competitors. Experts say that's by design.

  • Conference staff handing out accreditation badges to attendees
    Image attribution tooltip
    Anchiy/Getty Images via Getty Images

    The top security and tech conferences to attend in 2023

    From pure-play security to leadership events, here are some of the must-attend events for strategy-minded executives next year.

  • Huawei logo depicted on side of building at company's campus in Dongguan, China.
    Image attribution tooltip
    Kevin Frayer via Getty Images

    FCC bans imports of telecom gear from China-based companies

    The latest in a series of orders aligns the agency’s equipment authorization process with national security policies.

  • Pedestrians walk beside a stone wall with gilded letters spelling out "14 Wall Street."
    Image attribution tooltip
    Spencer Platt via Getty Images

    As companies tighten tech spend, demand for cybersecurity services grows

    Managed service providers can help fill talent needs and tame costs, but that strategy may require additional risk mitigation.

  • skeleton of a mastodon
    Image attribution tooltip
    Thomas Lohnes/Getty Images via Getty Images

    Growing Mastodon security community grapples with CISA impersonators

    An infosec.exchange account impersonating CISA Director Jen Easterly was suspended by the Mastodon instance administrator Monday, as the security community searches for a Twitter alternative.

  • A man and young woman sit and look at a tablet next to a Christmas tree.
    Image attribution tooltip
    bernardbodo via Getty Images

    ‘Tis the season for shopping and scams, CISA warns

    Adversaries exploit individuals hunting for the best deals online during the holiday shopping season. If a deal looks too good to be true, trust your instincts — it's not.

  • Image attribution tooltip
    Mark Wilson/Staff via Getty Images

    Defense Department launches zero trust, phasing out perimeter defense strategy

    Private sector partners say the rollout will raise the security bar to better protect the entire defense industry ecosystem.

  • In-house IT training session upskills workforce
    Image attribution tooltip
    Jovanmandic via Getty Images

    Security awareness training needs a revamp

    Too often security training is seen as a negative experience and a time to reprimand those who make security gaffes. But old strategies aren’t working. It’s time for a redo. 

  • Smiling young family looking at candy and Christmas presents in a store window.
    Image attribution tooltip
    RgStudio via Getty Images

    Three-quarters of retail, hospitality applications have security flaws

    Nearly 1 in 5 vulnerabilities in the retail and hospitality industry are considered high severity, Veracode found, creating considerable risks to the organization. 

  • Twitter logo depicted over photo of individual.
    Image attribution tooltip
    Leon Neal/Getty Images via Getty Images

    Where will the security community turn, if not Twitter?

    A consistent stream of credibility hits could cause lasting damage for cybersecurity and those who flock there.

  • Financial graph, software, cash flow
    Image attribution tooltip
    Ca-ssis via Getty Images

    Palo Alto Networks reports strong fiscal Q1 as security needs outpace economic fears

    The security firm also agreed to buy Cider Security, boosting its software supply chain security business.

  • A drilling rig and platform used in the oil and gas industry for offshore fuel exploration.
    Image attribution tooltip
    CloudVisual via Getty Images

    Offshore oil and gas at risk of potentially catastrophic cyberattack: GAO

    A report warns the industry could see an attack that rivals the deadly 2010 Deepwater Horizon disaster and urges Interior Department officials to stand up safeguards.

  • Highway sign with the word "recession next exit" on it.
    Image attribution tooltip
    ZargonDesign via Getty Images

    Tech sector execs see potential recession as a business opportunity

    Technology company leaders are preparing for economic downturn by investing selectively in the workforce and new technologies, according to EY survey.