Maren PeasleyPrincipal Systems EngineerPosted: 13 Jun, 20254 Min ReadThe Secret to Phishing-Resistant AuthenticationSay goodbye to easily foiled one-time passwords with this step-by-step guide to deploying FIDO2The Secret to Phishing-Resistant Authentication
Threat Hunter TeamSymantec and Carbon BlackPosted: 12 Jun, 20258 Min ReadFog Ransomware: Unusual Toolset Used in Recent AttackLegitimate employee monitoring software and various pentesting tools deployed.Fog Ransomware: Unusual Toolset Used in Recent Attack
Adarsh ShettyProduct Manager, Enterprise Security Group, BroadcomPosted: 10 Jun, 20255 Min ReadThe Next Move Problem: Why Detection Alone Isn’t Enough AnymoreToday’s threats don’t stop after the first move—neither should your defensesThe Next Move Problem: Why Detection Alone Isn’t Enough Anymore
Prateek TemkarSenior Director of Product Management, SymantecPosted: 6 Jun, 20255 Min ReadRead This Before Adopting AIHow to keep your data safe before activating tools like CopilotRead This Before Adopting AI
Enterprise Security Groupby BroadcomPosted: 5 Jun, 20255 Min ReadMeet the Threat Hunters Who Alert Security Teams To What’s ComingExtensive intel and expert analysis make our Threat Hunters a key component in protecting organizations from today’s critical threatsMeet the Threat Hunters Who Alert Security Teams To What’s Coming