Decrypting What Zero Trust Is, And What It Likely Isn’t

It’s always an indicator of confusion when instead of hearing “I want Q” I’m asked “what is Q?”. In this case the ‘Q’ is Zero Trust.  I’ll try and give my best take on what I understand Zero Trust to be. History Repeats Let’s start with the background. Quite a while back the Jericho Forum…
The post Decrypting What Zero Trust Is, And What It Likely Isn’t appeared first on . Read More HERE…

Read more

Google Warns of Android Zero-Day Bug Under Active Attack

Flaw impacts 18 Android models including Google’s flagship Pixel handset as well as phones made by Samsung, Huawei and Xiaomi. READ MORE HERE…

Read more

This Week in Security News: Ransomware Campaigns Persist with WannaCry as Most Common

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about how a total of 118 new ransomware families emerged in the first half of 2018, but only 47 new ones debuted in the first six…
The post This Week in Security News: Ransomware Campaigns Persist with WannaCry as Most Common appeared first on . Read More HERE…

Read more

How Do Threats Align With Detection And Solutions?

There are many different threats targeting many different areas of a corporate network. Have you ever wondered how those threats are stopped? What threats impact which areas of a network? What technology detects and blocks those threats? I wanted to build an interactive graphic to answer those questions. This interactive infographic can help you understand…
The post How Do Threats Align With Detection And Solutions? appeared first on . Read More HERE…

Read more

This Week in Security News: Unpatched Systems and Lateral Phishing

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about an attack against Elasticsearch that delivers backdoors as its payload. Additionally, read how cybercriminals are turning to hijacked accounts to perform lateral phishing attacks on…
The post This Week in Security News: Unpatched Systems and Lateral Phishing appeared first on . Read More HERE…

Read more