IdentityAT&T rolls out protections to block SIM-swapping attacks"Wireless Account Lock" allows customers to prevent the registration of new devices.
Vulnerability ManagementCisco patches critical 10.0 bug in Unified CM systemsA successful exploit could let an attacker log-in as the root user.
Data SecurityEncryption and decryption: The foundation of data protection Ensuring information remains confidential and secure is a core cybersecurity technique.
IdentityA New Identity: In defense of the end userHow IAM industrial complex sometimes forgets the little guy. Hint, that’s you and me.
Critical Infrastructure SecurityUS security agencies warn of Iranian cyberattacks on infrastructureIran may be battered, but they are not defeated and could lash out against U.S. bases worldwide and at businesses here at home.
AI/MLAI that empowers: Redefining security operations excellence with AI + human expertiseDownload eSentire's 10 questions to ask vendors about AI when choosing an MDR provider.
IdentityCisco warns of critical flaws in Identity Services Engine rated 10.0Flaws in Identity Services Engine (ISE) platform could allows remote code execution.
Network SecurityFDA calls for ‘Secure-by-Design’ cybersecurity for medical devicesThe agency has been beating the drum for more secure medical devices for two decades.
Cloud SecurityHow CIS Hardened Images secure systems and reduce costsCIS Hardened Images are virtual machine images hardened with the globally recognized secure configuration recommendations of the CIS Benchmarks.
Network SecurityMicrosoft dropping outdated drivers over security fearsMicrosoft is dropping support for a number of hardware drivers over concerns about security and compatibility.
Navigating the 8D city: Why multi-dimensional network security is no longer optionalAlbert EstevezApril 25, 2025