Google launches a regular scams and fraud advisory
How to guard against the holiday cyberattack surge
Security leaders discuss risks and offer advice on seasonal scams
More than 2,000 Palo Alto Networks firewalls compromised
CISA Director Jen Easterly to resign, cybersecurity experts weigh in
Finastra investigates data breach, security leaders discuss
Cyber agencies reveal top 15 routinely exploited vulnerabilities
How remote video verification is transforming commercial security
Notable physical security trends of 2024
Advice for Critical Infrastructure Security and Resilience Month
Understanding and applying the zero trust mentality
3 potential security risks to stay ahead of post-election
The role of artificial intelligence in cyber resilience
Black Friday gaming sales could be disrupted by bots
Making employees your security shield
Security experts respond to the Amazon employee data breach
Inside The 2024 Security Benchmark Report
Your favorite security leadership podcasts
Navigating the regulatory and compliance landscape of 2025
60% increase in scam domain registrations targeting holiday shoppers
Supply chain security: A key career skill
Security complexities of the remote workforce
Research uncovers the tool creating recent GitHub phishing attacks
One in five organizations have experienced a NHI security incident
65% of websites aren’t protected from bots
Malicious Python Package Index steals Amazon Web Services credentials
Outsmart disaster: Learning from world events and navigating evacuations
Comprehensive Exchange Server recovery plan for IT and exchange admins
Chinese threat actor exploits credentials from password spray attacks
Byline: The new stress test
Hacker in Snowflake Extortions May Be a U.S. Soldier
Feds Charge Five Men in ‘Scattered Spider’ Roundup
Fintech Giant Finastra Investigating Data Breach
An Interview With the Target & Home Depot Hacker
Microsoft Patch Tuesday, November 2024 Edition
FBI: Spike in Hacked Police Emails, Fake Subpoenas
Canadian Man Arrested in Snowflake Data Extortions
Booking.com Phishers May Leave You With Reservations
Change Healthcare Breach Hits 100M Americans
The Global Surveillance Free-for-All in Mobile Ad Data
Enhancing Cyber Resilience: Insights from CISA Red Team Assessment of a US Critical Infrastructure Sector Organization
2023 Top Routinely Exploited Vulnerabilities
Iranian Cyber Actors’ Brute Force and Credential Access Activity Compromises Critical Infrastructure Organizations
CISA Adds One Known Exploited Vulnerability to Catalog
Russian Military Cyber Actors Target US and Global Critical Infrastructure
#StopRansomware: RansomHub Ransomware
Iran-based Cyber Actors Enabling Ransomware Attacks on US Organizations
North Korea Cyber Group Conducts Global Espionage Campaign to Advance Regime’s Military and Nuclear Programs
CISA Red Team’s Operations Against a Federal Civilian Executive Branch Organization Highlights the Necessity of Defense-in-Depth
People’s Republic of China (PRC) Ministry of State Security APT40 Tradecraft in Action
Exploring the benefits of artificial intelligence while maintaining digital sovereignty
Federated access to Amazon Athena using AWS IAM Identity Center
Secure root user access for member accounts in AWS Organizations
Securing the RAG ingestion pipeline: Filtering mechanisms
Important changes to CloudTrail events for AWS IAM Identity Center
Threat modeling your generative AI workload to evaluate security risk
Secure by Design: AWS enhances centralized security controls as MFA requirements expand
Updated whitepaper: Architecting for PCI DSS Segmentation and Scoping on AWS
Discover duplicate AWS Config rules for streamlined compliance
Maximize your cloud security experience at AWS re:Invent 2024: A comprehensive guide to security sessions
Amazon Inspector suppression rules best practices for AWS Organizations
Implement effective data authorization mechanisms to secure your data used in generative AI applications
Unauthorized tactic spotlight: Initial access through a third-party identity provider
New AWS Secure Builder training available through SANS Institute
Adding threat detection to custom authentication flow with Amazon Cognito advanced security features
Spring 2024 PCI DSS and 3DS compliance packages available now
How to implement trusted identity propagation for applications protected by Amazon Cognito
How to mitigate bot traffic by implementing Challenge actions in your AWS WAF custom rules
Amazon identified internet domains abused by APT29
Exploring digital sovereignty: learning opportunities at re:Invent 2024