Identity threat detection and response adds user entity behavioral analytics to fraud detection, creating a powerful tool for real-time protection.Read More HERE
It’s unclear why the NSA issued in-depth mitigation guidance for the software boot threat now, but orgs should take steps to harden their environments.Read More HERE
Unknown senders have been shipping smartwatches to service members, leading to questions regarding what kind of ulterior motive is at play, malware or otherwise. Read More HERE
Exploiting a flaw in how the app handles communication with external tenants gives threat actors an easy way to send malicious files from a trusted source to an organization’s employees, but no patch is imminent.Read More HERE
For line-of-business execs, the fear of grinding mission-critical systems to a halt overrides the fear of ransomware. How can CISOs overcome this?Read More HERE
The impending regulations highlight the increasing importance of enhanced network security and regulatory compliance across the government sector.Read More HERE
Under construction: The world’s leading ransomware gang is workshopping ransomware for less obvious systems beyond Windows environments. Experts weigh in on how worried we should be.Read More HERE