As new cybersecurity threats continue to loom, the industry is running short of workers to face them. The 2022 (ISC)2 Cybersecurity Workforce Study identified a 3.4 million worldwide cybersecurity worker…
Posts Written ByThreatRavens
The Evolution of Antivirus Software to Face Modern Threats
Over the years, endpoint security has evolved from primitive antivirus software to more sophisticated next-generation platforms employing advanced technology and better endpoint detection and response. Because of the increased threat…
How Do Threat Hunters Keep Organizations Safe?
Neil Wyler started his job amid an ongoing cyberattack. As a threat hunter, he helped his client discover that millions of records had been stolen over four months. Even though…
Contain Breaches and Gain Visibility With Microsegmentation
Organizations must grapple with challenges from various market forces. Digital transformation, cloud adoption, hybrid work environments and geopolitical and economic challenges all have a part to play. These forces have…
Rookie cybersecurity mistakes to avoid | Cyber Work Podcast
Venafi solutions architect Steve Judd talks about the rookie mistakes new cybersecurity students make and how to combat issues that arise when deciding your cybersecurity specialization. – Get your FREE…
What is the Pentagon’s zero-trust policy: An overview | Cyber Work Podcast
Venafi solutions architect Steve Judd talks about what the Pentagon’s zero-trust policy is all about: its parameters, directives and what tight deadlines mean for people implementing changes. – Get your…
Cybersecurity leaders need to be communicators | Cyber Work Podcast | #shorts
Venafi solutions architect Steve Judd says everyone has to do security. No matter the level of your technical skill, cybersecurity leaders need to be good communicators first and foremost. –…
CEO, CIO or CFO: Who Should Your CISO Report To?
As we move deeper into a digitally dependent future, the growing concern of data breaches and other cyber threats has led to the rise of the Chief Information Security Officer…
Prilex modification now targeting contactless credit card transactions
Kaspersky discovers three new variants of the Prilex PoS malware capable of blocking contactless NFC transactions on an infected device.
How the Silk Road Affair Changed Law Enforcement
The Silk Road was the first modern dark web marketplace, an online place for anonymously buying and selling illegal products and services using Bitcoin. Ross Ulbricht created The Silk Road…