According to Redlock, cryptojacking, account compromises, and a lack of high-severity patching are all making the outlook on using AWS potentially one of higher risk. Too many companies seem to be forgetting that security must extend to the cloud to guarantee that their data will be safe. This means moving the focus of many security […]
Read MoreFor many of us, Intel has long been the “go-to” in processors, but these last few months have shown a few opening in the tech giant’s armor. This latest looks to be a minor issue, but businesses should remain aware – this could cause have some serious implications in environments where it is enabled. https://www.computerworld.com/article/3193830/security/vulnerability-hits-intel-enterprise-pcs-going-back-10-years.html […]
Read MoreLooks like a pretty simple attack could render it completely useless, are you willing to play the odds? https://motherboard.vice.com/en_us/article/3k4nd9/pgp-gpg-efail-vulnerability
Read MoreAccording to CyberArk’s latest findings, nearly half of the companies out there are not evolving once they put an InfoSec program into place – leaving them wide-open as attackers look for new ways to get in. Read more here: 46 Percent of Organizations Fail to Change Security Strategy After a Cyber Attack
Read MoreIts no secret that cybersecurity is on everyone’s mind. Most companies are waking up to the stark truth that they need to hire staff to keep their data safe, but did you realize just how many open jobs there are for these positions? While you are looking to staff, the bad guys aren’t sleeping, so […]
Read MoreThe Colorado Department of Transportation was brought to its knees by SamSam this week. Are you vulnerable? Read more: https://www.2-spyware.com/samsam-ransomware-hit-colorado-department-of-transportation?lipi=urn%3Ali%3Apage%3Ad_flagship3_feed%3BUj3NSRhaR4CEVe4QjP8aJQ%3D%3D
Read MoreIf you still think that security can be something that you “get to as soon as…”, then you may already be in trouble. Too many companies pay little attention to the risk potential until it is too late, and the bad guys are well aware of it. Security is something that must be baked into […]
Read MoreAccording to Thales threat report, breaches have risen for companies by about 36% this year, with 67% of respondents reporting one or more in their environment. Other findings include that the top three methods of preventing data loss and breaches are : Data-at-rest protection Network Security Data-in-motion protection Interestingly, the findings state that most companies […]
Read MoreAs new developments unfold in the Spectre saga – it appears that Intel shared the news about the vulnerability with Chinese interests before those in the USA – this could mean that threat actors in that region were able to react before we even knew about it. Regardless of the legal and international ramifications, White […]
Read MoreSpectre and Meltdown are major vulnerabilities, ones that could have very far-reaching implications. As Intel and the other chip manufacturers are figuring out exactly what to do about the loss of performance on their chips, the major providers of operating systems have all released guidance on how to best approach the problem. For now, the […]
Read More