ICS network compromise likely with Zeek security tool plugin flaws
Significant industrial control system environment compromise could be facilitated by exploiting vulnerabilities impacting open source network security monitoring tool Zeek's ICS protocol parsing plugin Ethercat.
There’s nothing new about the battle for identity in cyberspace
While the tools are different, protecting identities has been around for generations. So why haven't we learned how to leverage identity to establish a perimeter?
Kubernetes Security Operations Center announced the rollout of a zero-trust policy generator designed to simplify the task of managing role-based access controls for Kubernetes clusters.
Votiro Cybersec has launched a new unified platform for data detection and response that can extend its protection to include data in files that are in transit across an organization.