It is critical to select strong passwords and properly manage them so they remain secure. Thursday, May 5, 2022 By: Rebecca Taylor, Incident Response World...
What to consider when augmenting your SOC operations with an XDR solution Thursday, April 28, 2022 By: Eric Hemmendinger, Senior Consultant Product Management As a...
Why should XDR play a central role in your cybersecurity strategy? How is it a material improvement over the technologies you already have? And what...
When you’re under attack, the biggest danger you face is typically not the initial breach. It’s what the attacker does after that initial breach—moving laterally...
Almost two decades after they were developed, the prevalence and usage of quick response (QR) codes have expanded far beyond their original scope. While many...
Organizations have historically relied on a piecemeal, ad-hoc approach to managing cybersecurity incidents. However, the approach does not scale as threat actors become more sophisticated,...
More than 58% of the world’s 7.9 billion people have social media accounts. And the average user has accounts with 8.4 different social media sites....
Unpatched vulnerabilities are perhaps the greatest single threat to any organization’s security. That’s why it’s absolutely essential to track CVEs, map those to your environment,...
The Secureworks Cybersecurity Literacy Challenge is on! With a chance to win prizes up to $10,000, our carefully selected judges are looking for the best...