The coming new year is a good moment for CISOs to reflect on what they've learned this year and how to apply this knowledge going forward.
With the number of zero-days spiking in the last 18 months, organisations need to increase patching efforts. Software vendors can be more transparent, too.
Investigations into both cyber criminal and nation-state actors can have consequences. Some researchers have upgraded their physical security.
Malware targeting Linux environments has increased massively in the past year, with threat actors using a variety of techniques to carry out operations.
Attackers constantly search public code repositories like GitHub for secrets developers might inadvertently leave behind, and any tiny mistake can be exploited.
Better logs make it easier to distinguish between critical data and noise. Here's how to design logs with security in mind.
APT groups are developing new techniques that allow them to avoid detection and exfiltrate hundreds of gigabytes of data from Microsoft apps.
The number of attacks carried out using the popular suite has increased in the past two years as browsers become harder targets.