News

The only way to stay ahead of hidden threats is to treat every file as if it could be malicious, because it could be. Which ...
Amazingly, Medium has fixed the stats so my blog/podcast quarterly is back to life. As before, this covers both Anton on ...
Our sincere appreciation to LinuxFest Northwest (Now Celebrating Their Organizational 25th Anniversary Of Community Excellence), and the Presenters/Authors for publishing their superb LinuxFest ...
Recently, Gartner released the 2025 “Innovation Insight: Adversarial Exposure Validation in China”¹, NSFOCUS was selected as ...
IntroductionZscaler ThreatLabz researchers recently uncovered AI-themed websites designed to spread malware. The threat actors behind these attacks are exploiting the popularity of AI tools like ...
Our sincere appreciation to LinuxFest Northwest (Now Celebrating Their Organizational 25th Anniversary Of Community Excellence), and the Presenters/Authors for publishing their superb LinuxFest ...
At ColorTokens, we’ve always been about breach readiness by stopping lateral movement through microsegmentation. Our mission is simple. Contain the spread of threats and keep operations running, even ...
What’s the craic? Andrew Solender breathlessly claims this scoop: WhatsApp banned on House staffers’ devices ...
AI-powered defenses offer clear strategic advantages for telecom providers and enterprise security teams to help combat vishing attacks.
With over 15 years of experience in telecoms, UC, contact center, networking and security technologies, Dave provides strategic and technical consultancy as a trusted adviser to Xalient’s customers, ...
Cyberattacks against government agencies are escalating at an alarming pace. From state departments to small municipal offices, public sector organizations have become prime targets for ransomware, ...
Threats to retailers will intensify with more ransomware attacks, combined with the security implications of new technologies.