How to create Portainer teams for restricted development access

Jack Wallen shows you how to create a team and add users in Portainer in a secure way. [embedded content] Portainer is a great container management GUI that makes developing and managing... Read more »

Credential harvesting malware appears on deep web

Image: Adobe Stock/WunderBild Cloud-focused credential harvester and spam utilities, used to illicitly extract an organization’s database of usernames, passwords and emails, are on the rise. By some estimates, over 24 billion credentials... Read more »

Google Cloud offers Assured Open Source Software for free

Image: Google Open source software and software supply chain security risks continue to be a primary concern for developers and organizations. According to a 2022 study by electronic design and automation company... Read more »

With political ‘hacktivism’ on the rise, Google launches Project Shield to fight DDoS attacks

Image: Sundry Photography/Adobe Stock As has been widely documented, distributed denial of service, or DDoS, attacks rose precipitously last year. A microcosm of this upward trend involved exploits targeting public information sites... Read more »

Even after armed with defense tools, CISOs say successful cyberattacks are ‘inevitable’: New study

Image: CROCOTHERY/Adobe Stock In Cisco’s new Cybersecurity Readiness Index, only 15% of respondents to the global survey said their organizations have implemented security programs mature enough to defend against current cybersecurity risks.... Read more »

BECs double in 2022, overtaking ransomware

A look at 4th quarter 2022, data suggests that new threat surfaces notwithstanding, low-code cybersecurity business email compromises including phishing, as well as MFA bombing are still the prevalent exploits favored by... Read more »

First Dero cryptojacking campaign targets unprotected Kubernetes instances

Learn how this cryptocurrency campaign operates and its scope. Then, get tips on protecting vulnerable Kubernetes instances from this cybersecurity threat. Image: Pixabay The cybersecurity company CrowdStrike has observed the first-ever Dero... Read more »

Running WordPress on Azure for secure, fast and global content delivery

Learn about Microsoft’s WordPress on Azure App Service, as well as an interesting alternative from WP Engine. Image: Hugo Baeta Twenty years old this year, WordPress remains one of the most popular... Read more »

The Biden administration may eye CSPs to improve security, but the real caveat emptor? Secure thyself

Image: Maksym Yemelyanov/Adobe Stock President Joe Biden’s administration, as part of its recently released National Cybersecurity Strategy, said critical sectors such as telecommunications, energy and healthcare rely on the cybersecurity and resilience... Read more »

Cloud security, hampered by proliferation of tools, has a “forest for trees” problem

Image: Ar_TH/Adobe Stock A new study Networks found that, on average, organizations rely on over 30 tools for overall security, and that degree of complexity is making for less security, not more.... Read more »