Featured news
UAT-7290 targets high value telecommunications infrastructure in South Asia
Cisco Talos is disclosing a sophisticated threat actor we track as UAT-7290, who has been active since at least 2022.UAT-7290 is tasked with gaining...
Tech News
Security
Optimizing cloud resource costs with Elastic Observability and Tines
How can cloud engineers optimize resource costs using Elastic Observability and Tines? Follow this step-by-step guide to learn how to integrate Elastic Observability with...
Most popular
Imperva Wins CRN 5-Star Partner Program 3rd Year in a Row. Here are Some...
A lot goes into building a good IT channel program. A truly-effective program should meet the vendor’s needs while also delivering attractive benefits to...
Insights from the Verizon 2018 Data Breach Investigation Report
The 2018 Verizon Data Breach Investigation Report (DBIR) was published in early April, reporting on 53,308 security incidents and 2,216 data breaches from 67...
Microsoft DCU uses UK courts to hunt down cyber criminals
Microsoft has taken down the RedDVS cyber crime-as-a-service network after obtaining a UK court order, marking its first civil legal action outside of the...
NSA urges continuous checks to achieve zero trust
The agency leading the US government’s cryptology and cyber security strategies has published its latest zero-trust guidance - Read more












