March 27, 2017 The Next Destination for Your Security Operations Is the Cloud 2 min read - Security operations are moving to the cloud, and IT managers are finding ways to support the use of a broad range of business applications on demand.
March 24, 2017 It’s a Wild, Wild Word: New Macro Malware Now Infecting Both Windows and MacOS 2 min read - New brands of macro malware are doubling down on Windows and MacOS operating systems. Here's a look at the newest Word-based attack.
March 23, 2017 WiCyS 2017 Addresses Skills, Gender Gap in Cybersecurity Industry 2 min read - One of the greatest opportunities to see cybersecurity collaboration in action is at the upcoming Women in Cybersecurity (WiCyS) Conference.
March 22, 2017 Hacked Site Reports Are on the Rise, Google Says 2 min read - Hacked site numbers continue to increase, according to Google. Businesses must take steps to ensure their online properties are safe and secure.
March 22, 2017 Pucker Up: Lips Can Now Provide Biometric Authentication 2 min read - Researchers from Hong Kong Baptist University have developed a new method of biometric authentication where devices read lip patterns.
March 22, 2017 Burgenoning Bug Bounty Programs Up the Ante 2 min read - Bug bounty programs are now paying out more to white-hat hackers, but they're also tightening regulations on payments and structure.
March 20, 2017 Transform Your SOC with Managed Services Using Carbon Black and QRadar 3 min read - Carbon Black is a leader in next-generation endpoint security, and its products are initiating an evolution in SOC process and procedure.
March 20, 2017 Unraveling GootKit’s Stealth Loader 2 min read - GootKit is an ongoing malware project that affects the three most popular browsers: Internet Explorer, Mozilla Firefox and Google Chrome.
March 16, 2017 Petya Ransomware Gets Hijacked 2 min read - A new version of Petya ransomware, called PetrWrap, has been spotted by security researchers. This Trojan leverages old tricks to make fast money.
March 16, 2017 New POS Malware Leverages Modular Sleight of Hand to Exfiltrate Card Data 2 min read - Time for a show? New POS malware MajikPOS uses modular sleight-of-hand tricks and a variety of methods to gain system access for credit card info access.