Endpoint June 25, 2019 Is Your Endpoint Protection Strategy Ready for 5G? 5 min read - If you accept that 5G technology comes with three inherent challenges — manageability, the supply chain and usage — then the endpoint protection challenge makes a whole lot more sense.
CISO June 21, 2019 3 IoT Security Considerations for Operational Technology Environments 3 min read - The increasing connectedness of tools and devices is expanding the threat surface and introducing IoT security risks to operational technology environments.
June 18, 2019 InterPlanetary Storm Malware Using IPFS P2P Network to Hide Its Activities 2 min read - A malware campaign dubbed InterPlanetary Storm is hiding its network activity among legitimate traffic by using a P2P network for its command-and-control communications.
Intelligence & Analytics June 17, 2019 How to Take Advantage of Alarming Cybersecurity News 3 min read - The security industry does a thorough job of conveying the latest cybersecurity news, albeit sometimes to the detriment of the people whose job it is to set security priorities.
June 11, 2019 Attack Campaign Exploits CVE-2019-2725, Abuses Certificate Files to Deliver Monero Miner < 1 min read - Researchers observed an attack campaign exploiting CVE-2019-2725 and abusing certificate files to deliver a Monero miner.
June 3, 2019 New York Nonprofit Organization Traces Data Breach to Employee Email Accounts 2 min read - People Inc., a nonprofit organization based in New York state, has traced a recent data breach to compromised employee email accounts.
Intelligence & Analytics May 31, 2019 IoMT Security: A Comprehensive Approach to Mitigate Risk and Secure Connected Devices 7 min read - IoT technology is taking over the healthcare industry because it has become essential. But once a device is connected to your network, who is responsible for IoMT security and privacy?
Identity & Access May 31, 2019 Why Privileged Access Management Must Be Part of Your Overall IAM Strategy 4 min read - When you implement a privileged access management solution as a standalone project, you will often face the same challenges that you had before you implemented it.
May 8, 2019 Fraudsters Sending Email, SMS Messages Linked to Tech Support Scams Hosted on the Cloud 2 min read - Digital fraudsters are sending out emails and SMS messages that link to tech support scams hosted on popular cloud platforms.
CISO April 25, 2019 Set Expectations and Boundaries With Your Security Program to Minimize Risk 3 min read - Good communication, clear expectations and enforced boundaries are all key to the success of your security program.