Understanding Why Multi-Signal MDR Matters
Cloud adoption, business applications and remote users continue to expand at exponential rates. Your cybersecurity team is fighting a losing battle to keep pace with your business requirements and growing…
Linux version of REvil ransomware targets ESXi VM
The REvil ransomware operators added a Linux encryptor to their arsenal to encrypt Vmware ESXi virtual machines. The REvil ransomware operators are now using a Linux encryptor to encrypts Vmware…
Five Steps for Safely Migrating your Workloads to the Cloud
Why security in the cloud is a shared responsibility relationship between the infrastructure provider and the customer By Paul Farrall, CISO at Skytap Organizations moving workloads to the cloud must…
New Report Shows Over Two Million Secrets Detected on Public GitHub in 2020 and a 20% growing trend Year-Over-Year.
By Jeremy Thomas, GitGuardian CEO When we started working on GitGuardian’s detection algorithm and got the first detection results, we could not believe it. We were facing a very counterintuitive…
Securing Patient Private Information in The Age of Shared Information
By Christian Gitersonke, CEO, Health Insurance Answers The Problem Theft of Private Health Information (PHI) has been around almost as long as healthcare in this country. As technology has evolved…
Norway blames China-linked APT31 for 2018 government hack
Norway police secret service states said that China-linked APT31 group was behind the 2018 cyberattack on the government’s IT network. Norway’s Police Security Service (PST) said that the China-linked APT31…
Manage the Cloud Permissions Gap to Achieve Zero Trust
The Cloud Permissions Gap exposes organizations to highly exploitable risk combined with the inability to implement and manage Zero Trust policies. By Raj Mallempati, CloudKnox Security COO In 2020, when…
The Solution to Overcoming Cyber Threats in A 5g World
Optical Wireless Communciations (Owc) Will Be Key For Maximizing Security By Michael Abad-Santos, Senior Vice President of Business Development and Strategy, BridgeComm Nearly 6 billion Internet of Things (IoT) devices…
G7 calls on Russia to dismantle operations of ransomware gangs within its borders
The member states of the G7 group have called on Russia and other states to dismantle operations of the ransomware gangs operating within their countries. G7 member states have called…
DoJ: Investigations into ransomware attacks must have similar priority as terrorism
The U.S. Department of Justice was to assign investigation on ransomware attacks the same priority as terrorism in the wake of the Colonial Pipeline hack. The U.S. Department of Justice…
French intel found flaws in Bluetooth Core and Mesh specs
Attackers could exploit a set of Bluetooth vulnerabilities, affecting the Core and Mesh Profile specifications, to conduct man-in-the-middle (MitM) attacks. Researchers at the french intelligence agency ANSSI discovered multiple flaws in the Bluetooth Core and Mesh…
Identity crisis? It’s time to take the holistic approach.
In planning for a secure future hybrid working reality, many IT leaders have reconsidered how they manage the identities on their network. Their workforce now uses new systems and devices,…