Attacker Dwell Time: Ransomware’s Most Important Metric
September 30 2020How to bolster security defenses by zeroing in on the length of time an interloper remains undetected inside your network.
Read moreHow to bolster security defenses by zeroing in on the length of time an interloper remains undetected inside your network.
Read moreMalware-based attacks are out, phishing is in, along with credential stuffing and business email compromise. Microsoft recommends defensive tactics in its new report on rising threats.
Read moreShorter, faster, multivector attacks had a greater impact on victims.
Read moreIn a least one instance, the Palmerworm APT group was able to remain undetected on a compromised system for nearly six months, according to Symantec.
Read moreRemote workers and scattered teams are relying on Slack more and more for messaging and collaboration. Here are a few extra tips for keeping data and systems more secure...
Read moreSynopsys issues an advisory for vulnerabilities affecting the chipsets of wireless routers from Qualcomm, Mediatek, and Realtek.
Read moreEnabling engineers to share responsibility for security and empowering them to erase common vulnerabilities are good starting points.
Read moreMicrosoft shuts down Azure Active Directory instances used by attackers to evade detection and warns that the use of open source tools by espionage groups is growing.
Read moreStep up, put the architecture and organization in place, and take responsibility. If you don't, who will?
Read more
Recent Comments