Endpoint July 26, 2019 Is It Time to Start Certifying Connected Devices? 4 min read - Connected devices go through hardware checks and certification before they hit the market. The same cannot be said for software checks, which begs the question: Is it time to start certifying devices?
July 22, 2019 Weekly Security News Roundup: Vulnerability Exposed Instagram Attacks to Hijacking 3 min read - Last week in security news, a researcher uncovered a critical vulnerability that allowed attackers to hijack any Instagram account within 10 minutes.
Endpoint July 1, 2019 Technology, the Enterprise or the User: Which Owns Mobile Security? 4 min read - To best manage mobile security within your enterprise, you need to maintain balance between technology, enterprise and user responsibilities.
Endpoint June 25, 2019 Is Your Endpoint Protection Strategy Ready for 5G? 5 min read - If you accept that 5G technology comes with three inherent challenges — manageability, the supply chain and usage — then the endpoint protection challenge makes a whole lot more sense.
Endpoint June 19, 2019 IoT Security and the Enterprise: A Practical Primer 5 min read - IoT security is now a hot topic, but beyond the hype and hyperbole, how can enterprises effectively secure connected networks and safeguard IoT devices?
May 20, 2019 More Than 100 US Businesses Affected by Ryuk Ransomware Since August 2018, Finds FBI 2 min read - The Federal Bureau of Investigation (FBI) has determined that more than 100 U.S. businesses suffered Ryuk ransomware infections between August 2018 and mid-May 2019.
Intelligence & Analytics April 26, 2019 Why You Need a Healthy Mix of Security Analytics to Investigate Threats 2 min read - Effective threat management requires security teams to combine various sources of security analytics with machine-generated data to investigate incidents with speed and accuracy.
April 23, 2019 New DLL CryptoMix Ransomware Reportedly Using Remote Desktop Services for Installation 2 min read - Security researchers discovered that a new DLL CryptoMix ransomware variant is reportedly using Windows Remote Desktop Services (RDS) to install itself on unsuspecting users' machines.
April 2, 2019 Unnam3d Ransomware Moves Files Into Protected RAR Archives, Demands Amazon Gift Card 2 min read - Security researchers discovered a new ransomware family called Unnam3d that moves targeted files into protected RAR archives and demands an Amazon gift card as ransom.
Endpoint March 15, 2019 How Patch Posture Reporting Improves Security Landscapes 6 min read - If your vulnerability management tools do not report on your company's patch posture, you may be missing crucial holes in your software that are ripe for exploitation.