May 30, 2023How to Protect Against Tsunami DDoS AttacksThe escalating threat of Tsunami-sized web DDoS attacks is a growing concern. This emerging generation of attacks is not only larger in...
May 30, 2023Three Key Tips for Security Teams to Reduce the Threat from Email Attacks This guest post was contributed by Trevor Collins, Network Security Engineer, WatchGuard Technologies Business email compromise (BEC) is...
May 30, 2023The Cyber Jack Podcast - The Importance of Diversity of Thought - Larry Whiteside Jr., RegScaleWhen individuals with different backgrounds, perspectives, and experiences come together, they bring unique insights and approaches to...
May 27, 2023What the New NIST Guidelines for Handling Sensitive Information Means for OrganizationsIn a move to enhance the protection of sensitive unclassified information, the National Institute of Standards and Technology (NIST) has...
May 26, 2023Expert Sound Off: Chinese Hacking Group Volt Typhoon Targets US in Major Cyber-Espionage CampaignAccording to reports from Western intelligence agencies and Microsoft, a state-sponsored Chinese hacking group has been engaged in a...