How MSSPs Achieve Exponential SOC Performance With Morpheus AI
Your SOC handled over 1,000 alerts yesterday. Your team investigated about half of them. The other half? They’re in...
Your SOC handled over 1,000 alerts yesterday. Your team investigated about half of them. The other half? They’re in...
What is Palm Vein Unlocking Technology? Okay, so you know how everyone is kinda worried about getting their phones...
I hadn’t intended to drive for 16 hours. It’s around midnight and my friend and I are about two...
Image: AVC Photo Studio/Adobe Stock A fog has lifted, and the news about ransomware reveals we fell on black days....
By Byron V. Acohido I’ve been writing about data trust and privacy engineering for more than a decade. Related: Preserving...
Broader implications for enterprises Analysts say European regulators are becoming more selective about which complaints proceed, with greater emphasis on...
AI Cyber Attacks I had the pleasure of speaking with Channel 10 recently about one of the most pressing topics...
Jeff Reed, chief product officer at Vectra AI, talks about the company’s latest advances in detection and response—and how AI...
Those who know me know about my love of the Raspberry Pi. I’ve got tons of them stashed around various...
Oracle over the weekend issued another security alert about a vulnerability in its E-Business Suite (EBS), the software family that...
Two years ago, Americans anxious about the forthcoming 2024 presidential election were considering the malevolent force of an election influencer:...
Today’s world requires us to make complex and nuanced decisions about our digital security. Evaluating when to use a secure...
Slide about AI’s impact on phishing during an email security roundtable event at this week’s Proofpoint Protect 2025 conference in...
Cisco published advisories and a supplemental post about three zero-day vulnerabilities, two of which were exploited in the wild by...
September 25, 2025 Enterprise browsers and isolation tools have changed how organizations think about web security. By controlling and monitoring...