The Cloud Data Shield relies on confidential computing, which protects data while it’s in use by enterprise applications. IBM today announced the general availability of IBM Cloud Data Shield,...
Read moreAttackers Prefer Ransomware to Stealing Data
April 23 2020Financial data is still in demand, but ransomware becomes the most popular way to try to cash in from compromised companies, according to Trustwave. For the first time, more...
Read moreAttackers Prefer Ransomware to Stealing Data
April 23 2020Financial data is still in demand, but ransomware becomes the most popular way to try to cash in from compromised companies, according to Trustwave. For the first time, more...
Read moreStandard language and processes, not to mention more efficient dissemination of findings and alerts all make documenting your security processes a must As cyber threat intelligence grows as a...
Read moreStandard language and processes, not to mention more efficient dissemination of findings and alerts all make documenting your security processes a must As cyber threat intelligence grows as a...
Read moreIs COVID-19 Intensifying the Need for Security Staffing?
April 22 2020Overall, security practitioners should find themselves in a better working situation than many other professionals. However, we are not immune. A global recession is almost a certainty — the...
Read moreIs COVID-19 Intensifying the Need for Security Staffing?
April 22 2020Overall, security practitioners should find themselves in a better working situation than many other professionals. However, we are not immune. A global recession is almost a certainty — the...
Read moreThe technique would enable attackers to run malicious code via Remote Desktop Protocol using DLL side-loading to bypass security controls. Researchers have discovered a defense evasion technique that could...
Read moreThe technique would enable attackers to run malicious code via Remote Desktop Protocol using DLL side-loading to bypass security controls. Researchers have discovered a defense evasion technique that could...
Read moreFrom at least January to April 2020, suspected Vietnamese actors APT32 carried out intrusion campaigns against Chinese targets that Mandiant Threat Intelligence believes was designed to collect ...
Read more
Recent Comments