A look into the file-transfer attack (and how to protect your data)

A look into the file-transfer attack (and how to protect your data)

A discussion of recent Fortra, Accellion, and Progress Software file transfer attacks and the security measures that could be used to prevent them. The post A look into the file-transfer attack (and ...
CISA Order Highlights Persistent Risk at Network Edge

CISA Order Highlights Persistent Risk at Network Edge

The U.S. government agency in charge of improving the nation's cybersecurity posture is ordering all federal civilian agencies to take new measures to restrict access to Internet-exposed networking equipment. The directive comes ...

Application Security Check Up