Hariom Singh May 20, 2022May 20, 2022 - 6 min read Put SecOps in the Driver’s Seat with Custom Assessment and Remediation
Thomas Nuth May 16, 2022May 16, 2022 - 7 min read How to Get Useful Monitoring of File-level Security
Debra M. Fezza Reed May 10, 2022May 12, 2022 - 8 min read May 2022 Patch Tuesday | Microsoft Releases 75 Vulnerabilities with 8 Critical; Adobe Releases 5 Advisories, 18 Vulnerabilities with 16 Critical.
Amit Gadhave May 8, 2022May 8, 2022 - 9 min read Ursnif Malware Banks on News Events for Phishing Attacks
Swapnil Ahirrao May 6, 2022May 10, 2022 - 7 min read CISA Alert: Top 15 Routinely Exploited Vulnerabilities
Swapnil Ahirrao May 4, 2022May 6, 2022 - 8 min read Ransomware Insights from the FBI’s 2021 Internet Crime Report
Ramesh Ramachandran April 21, 2022April 21, 2022 - 9 min read Assessing Certificate Risk with Qualys VMDR
Akshat Pradhan April 20, 2022April 20, 2022 - 6 min read Implications of Windows Subsystem for Linux for Adversaries & Defenders (Part 2)
Debra M. Fezza Reed April 12, 2022May 9, 2022 - 6 min read April 2022 Patch Tuesday: Microsoft Releases 145 Vulnerabilities with 10 Critical; Adobe Releases 4 Advisories, 78 Vulnerabilities with 51 Critical.