A majority of organizations say the acceleration was driven by a need to support more remote employees.
Read moreBackdoors, cryptominers, and ransomware were the most widely detected threats by the DHS Cybersecurity and Infrastructure Security Agency (CISA)'s intrusion prevention system EINSTEIN.
Read moreBackdoors, cryptominers, and ransomware were the most widely detected threats by the DHS Cybersecurity and Infrastructure Security Agency (CISA)'s intrusion prevention system EINSTEIN.
Read moreNew MacOS Ransomware Hides in Pirated Program
July 1 2020A bogus installer for Little Snitch carries a ransomware hitchhiker.
Read moreVulnerabilities had not been exploited or publicly disclosed before fixes were released, Microsoft reports.
Read more4 Steps to a More Mature Identity Program
July 1 2020Security has evolved to evaluate an identity's attributes, access, and behavior to determine appropriate access.
Read moreSecuring the International IoT Supply Chain
July 1 2020Together with Nate Kim (former student) and Trey Herr (Atlantic Council Cyber Statecraft Initiative), I have written a paper on IoT supply chain security. The basic problem we try...
Read moreWhile financial institutions and government remain popular targets, COVID-19 research organizations are now also in the crosshairs.
Read moreBooby-trapped images could be used to attack Windows 10 and Windows Server 2019 - update now!
Read moreNo US entity charges citizens for registering to vote, but plenty of Google ads were happy to do so - and to grab your PII in the process....
Read more
Recent Comments