October 30, 2019Security Old RAT, New Moves: Adwind Hides in Java Commands to Target Windows The Adwind remote access Trojan conceals malicious activity in Java commands to slip past threat intelligence tools and steal user data. ——– […]
October 30, 2019Security The Real Reasons Why the C-Suite Isn’t Complying with Security Is the C-suite really that bad at following security policy? Or is it a case of mixed messages and misunderstanding? ——– Free […]
October 30, 2019Security Why Cloud-Native Applications Need Cloud-Native Security Today’s developers and the enterprises they work for must prioritize security in order to reap the speed and feature benefits these applications […]
October 30, 2019Security Google Cloud Adds New Security Management Tools to G Suite Desktop devices that log into G Suite will have device management enabled by default, streamlining processes for IT admins. ——– Free High […]
October 30, 2019Security Who Made the List Of 2019’s Nastiest Malware? This year’s compilation features well-known ransomware, botnet, and cryptomining software. ——– Free High Security Email from Sigma
October 30, 2019Security Cybersecurity Trumps Political, Reputational Concerns for Companies The average company has seen its risk increase, with cybersecurity topping the list of business threats, followed by damage to reputation and […]
October 30, 2019Security Why It’s Imperative to Bridge the IT & OT Cultural Divide As industrial enterprises face the disruptive forces of an increasingly connected world, these two cultures must learn to coexist. ——– Free High […]
October 30, 2019Security What Do You Do When You Can’t Patch Your IoT Endpoints? The answer, in a word, is segmentation. But the inconvenient truth is that segmentation is hard. ——– Free High Security Email from […]
October 30, 2019Security Takeaways from the $566M BriansClub breach Reporting on the exposure of some 26 million stolen credit cards leaked from a top underground cybercrime store highlighted some persistent and […]
October 30, 2019Security What you may be getting wrong about cybersecurity Attention-grabbing cyberattacks that use fiendish exploits are probably not the kind of threat that should be your main concern – here’s what […]