Making extra money from victims appears to be the goal, Symantec says.
Read moreBack to Basics with Cloud Permissions Management
June 23 2020By using the AAA permissions management framework for cloud operations, organizations can address authentication, authorization, and auditing.
Read moreCybercrime Infrastructure Never Really Dies
June 23 2020Despite the takedown of the "CyberBunker" threat operators in 2019, command-and-control traffic continues to report back to the defunct network address space.
Read more5 Steps for Implementing Multicloud Identity
June 23 2020Why embracing, not fighting, decentralization will pave the way to smoother cloud migrations.
Read moreThe travel-booking giant had been slowly starting to transition away from VPN dependence. Then COVID-19 happened, and suddenly 700 third-party call-center workers were working from home.
Read moreMicrosoft Acquires IoT/OT Security Firm CyberX
June 22 2020Deal extends Microsoft Azure for legacy industrial devices.
Read moreIn the face of tighter budgets and lowered spending forecasts due to the pandemic, optimizing and improving the efficiency of security programs -- without sacrificing integrity -- has never...
Read moreNetworking devices sold under at least one major brand have a firmware vulnerability that allows hackers to take control of the device, a cybersecurity firm claims.
Read moreWorking from home is new for many enterprise employees, yet many say they've received little in the way of new training or technology to keep them safe.
Read more
Recent Comments