News

The Matanbuchus malware loader has been seen being distributed through social engineering over Microsoft Teams calls ...
We are honored to be recognized once again as a Leader in the 2025 Gartner® Magic Quadrant™ for Endpoint Protection Platforms ...
Whether a compromise is real or the result of faulty telemetry, the consequences—panic, downtime, reputational risk—are very ...
Microsoft has announced it will no longer use engineers based in China to support U.S. military cloud services, following ...
Sen. Tom Cotton (R-Ark.) pressed the Defense Department on Thursday for information about Microsoft’s reported use of Chinese ...
Security leaders must constantly adapt data and application protection methods to fend off the latest cybersecurity threats. No one method will suffice on its own. With a combination of employee ...
The Pentagon bans foreign citizens from accessing highly sensitive data, but Microsoft bypasses this by using engineers in ...
Today, every company has invested in one or more Cloud Security Posture Management (CSPM) tools, such as Wiz, Orca, or Palo ...
Bad habits can be hard to break. Yet when it comes to security, an outdated practice is not only useless, but potentially ...
This is like asking the fox to guard the henhouse and arming the chickens with sticks in case the fox gets mad, said Michael ...
Palo Alto Networks today extended its alliance with Okta to provide deeper integrations to enable cybersecurity teams to restrict which applications can be accessed from a secure browser.
Piyush Sharrma  is a seasoned cybersecurity and product leader with over 18 years of experience building and scaling ...