Even if you can't see your employees in the office, they still need to be reminded that criminals are always trying to spot a weak link in the chain.
Read moreHow to Pinpoint Rogue IoT Devices on Your Network
October 12 2020Researchers explain how security practitioners can recognize when a seemingly benign device could be malicious.
Read moreSecurity and DevOps
October 12 2020Like most such mobile malware, the new one doesn't encrypt data but attempts to make an infected system impossible to use, Microsoft says.
Read moreApple Pays Bug Bounty to Enterprise Network Researchers
October 9 2020So far, the company has doled out $288,000 to five researchers who, in three months, found 55 vulnerabilities in its corporate infrastructure.
Read moreCritical Zerologon Flaw Exploited in TA505 Attacks
October 9 2020Microsoft reports a new campaign leveraging the critical Zerologon vulnerability just days after nation-state group Mercury was seen using the flaw.
Read moreCISOs Planning on Bigger Budgets: Report
October 9 2020Budgets are on the rise, even in a time of revenue worries across the industry.
Read moreWhy MSPs Are Hacker Targets, and What To Do About It
October 9 2020Managed service providers are increasingly becoming the launching pad of choice for ransomware and other online malfeasance.
Read moreIn recent weeks, Emotet has emerged as the most common form of ransomware. Managing the risk involves starts with understanding the way it works.
Read more
						
                        
                        
                        
Recent Comments