Endpoint June 19, 2019 Why Conditional Access Is Essential to Zero Trust Security 4 min read - With more devices outside the corporate perimeter and more apps stored in the public cloud, organizations must abandon on-premises security for new conditional access models to achieve zero trust.
Endpoint June 19, 2019 IoT Security and the Enterprise: A Practical Primer 5 min read - IoT security is now a hot topic, but beyond the hype and hyperbole, how can enterprises effectively secure connected networks and safeguard IoT devices?
June 18, 2019 Outlaw Threat Group Using Botnet to Distribute Monero Miner, Perl-Based Backdoor 2 min read - The Outlaw threat group is using a botnet to distribute a Monero cryptocurrency miner and a Perl-based backdoor component.
June 17, 2019 XENOTIME Threat Group Now Targeting Electric Utility Organizations 2 min read - In addition to oil and gas companies, the XENOTIME threat group has begun targeting electric utility organizations located in the U.S. and elsewhere.
June 12, 2019 Latest Mirai Malware Variant Contains 18 Exploits, Focuses on Embedded IoT Devices 2 min read - Researchers discovered a Mirai malware variant with 18 exploits targeting embedded internet of things (IoT) devices.
CISO June 5, 2019 Security Awareness Training Without Tech Awareness Can Leave Employees in the Dark 3 min read - With the advent of digital transformation, it becomes even more important — and urgent — that business technology awareness be stressed right along with security awareness training.
June 3, 2019 New HiddenWasp Linux Malware Focused Solely on Achieving Targeted Remote Control < 1 min read - A new threat called HiddenWasp is different from other Linux malware in that it's focused solely on achieving targeted remote control of infected hosts.
CISO June 3, 2019 The Need for Automation in Supporting Privacy Initiatives 6 min read - As tools and systems in the market evolve, there is a great opportunity for organizations to begin their journey of automating their privacy initiatives.
Intelligence & Analytics May 31, 2019 IoMT Security: A Comprehensive Approach to Mitigate Risk and Secure Connected Devices 7 min read - IoT technology is taking over the healthcare industry because it has become essential. But once a device is connected to your network, who is responsible for IoMT security and privacy?
CISO May 28, 2019 Third-Party Risks Need New Approaches 5 min read - Businesses need to adopt a strategic approach to managing third-party risks that provides an integrated view of the vendor relationship process.