sponsored content news
How the public sector can adopt modern pentesting solutions
A new report explains how pentesting of web and mobile applications offer valuable insights and context about vulnerabilities.
Operational technology asset visibility fuels a capable cybersecurity program
New report offers insights into the vital role of asset visibility in protecting the entire operational technology environment.
Planning a robust response to cyberthreats with a zero-trust mindset
New white paper outlines near-term tactics to energize government agencies’ cybersecurity efforts and zero trust implementation.
White House joins industry leaders to double down on commitment to zero trust
U.S. National Cyber Director and top leaders from Google and Citibank promote public-private partnerships to increase critical cyber defenses at the recent Google Cloud Security Summit.
Unpacking key competencies for infosec leaders
New research offers insights into how to embed information security and business skills to help drive growth and transformation.
Implementing effective OT security posture
New guide details key components of operational technology (OT) cybersecurity program.
New research identifies poor IAM policies as the greatest cloud vulnerability￼
Palo Alto Networks threat intelligence unit finds identity and access management policy flaws remain a principal cause of cloud security vulnerabilities.
Combatting emerging-malware aimed at industrial control systems￼
New report offers insights on CHERNOVITE and the PIPEDREAM malware that threatens industrial control systems.
Achieving web application security￼
By adopting modern application security tools, organizations can reevaluate teams, structures and processes to address current development needs better — and evolving missions.
Strengthening industrial cybersecurity￼
Dragos’ analysis and recommendations to combat global threat activity targeting industrial environments.