The on-going pandemic is a crucial enabler of initiating the digital transformation in cloud computing not just as an operating model but mainly as a technological shift. Many large and…
Could we have ever predicted that “Zoom-bombing” (similar to “photo-bombing” where a total stranger jumps in the middle of your frame as you take a selfie photo) would be a…
What We Are Reading
Silo for Research (Toolbox) recieved a High Performer badge for the Threat Intelligence Software category. Read what Authentic8 customers say about Silo.
Bad actors are using a message disguised as an official notification from the Outlook team to trick people into entering their credentials into a phishing website, leaking them in the process and exposing the company they work for. Phishing is one of the most common methods to obtain legitimate credentials, letting attackers compromise systems with
AppSecCali 2020 - Abhay Bhargav's 'Dr. DevSecOps: Or How I Stopped Worrying About CI And Started Loving The Cloud' - Security Boulevard
Many thanks to AppSec California 2020 for publishing their outstanding AppSecCali 2020 Conference Videos. Enjoy! Permalink
Most IT professionals say employees are allowed to use personal devices for work. And while the use of personal devices at work is growing rapidly, many are unprepared to balance productivity with security, new data shows.
Is Your Malware Detection Future-Proof? 7 Adaptable Technologies for Elusive Threats - Security Boulevard
While the media have extensively covered the recent spike in malware, a certain aspect seems to have been downplayed. The truth is, not only have cyber-attacks grown significantly during the pandemic (in March alone, 832 million records were breached through malware), but their complexity has also visibly increased as well.
One of the most prevalent issues impacting the effectiveness of security teams who use SIEM as their primary means of threat detection and remediation is the fact that data logs are an attractive medium for modern hackers to exploit.