Training Bank Employees on Cybersecurity
Employees across many industries have become familiar with some sort of annual cybersecurity training at their organizations, from watching informational...
Employees across many industries have become familiar with some sort of annual cybersecurity training at their organizations, from watching informational...
New botnet HTTPBot targets gaming and tech industries with surgical attacks Pierluigi Paganini May 16, 2025 New botnet HTTPBot is...
A major data breach of Coinbase continues to roil the cryptocurrency exchange, with executives saying it could cost the company...
In AI, as with so many advancing technologies, security often lags innovation. The xAI incident, during which a sensitive API...
How Can We Cultivate Trust with Secure NHIs Practices? When we navigate in increased digital interconnection, establishing trust in cybersecurity...
Are You Safe With Your Current Non-Human Identity Security? The migration of services to the cloud promises flexibility, scalability, and...
Bradley K. was a brand-new dad, sleep-deprived and juggling life with a newborn, when he received a phone call that...
Artificial Intelligence is something that we as organizations need to keep up with our technology-loving contemporaries. After all, it’s...
Across private conversations with CISOs, CIOs, and heads of HR and identity, one issue continues to emerge as both urgent...
Lohrmann on Cybersecurity Most governments struggle with replacing legacy systems for a variety of reasons. But some people claim legacy...
We’re thrilled to officially announce our integration with Nozomi Networks, the recognized leader in OT and IoT cybersecurity. Get the...
Cybersecurity researchers are warning of a new campaign that's targeting Portuguese-speaking users in Brazil with trial versions of commercial remote...
The Vulnerability Treadmill The reactive nature of vulnerability management, combined with delays from policy and process, strains security teams. Capacity...
May 8, 2025 How Abraxas Transformed Their MSSP Operations with Swimlane Security Automation One of my favorite parts of my...
With this post, the X-Ops blog is thrilled to present research from our Sophos siblings newly joining us from Secureworks,...