Microsoft issued an advisory regarding Windows Hello for Business (WHfB) and its implementation within Active Directory, as public keys remain accessible even when the device is removed from Active Directory.
All about Virtualization and Cloud Security | Recent Articles:
Anyone who has been following security trends in recent years cannot fail to have noticed the preponderance of data breaches which have stemmed from unsecured Amazon S3 buckets.
The whole concept of “enterprise” has changed dramatically in recent years. With ever-growing ecosystems of connected partners, suppliers, customers, and other third parties, companies have opened up new opportunities for business growth.
Implementation of the California Consumer Privacy Act of 2018 (CCPA) is fast approaching, and based on a recent report the news is not great as far as organizations’ progress in complying with the new rules as well as other data privacy regulations.
While there’s been a lull in 2019, the data breach and regulatory-related fines from the Department of Health and Human Services do keep piling up.
- Bitdefender announces the general availability release of GravityZone Sandbox Analyzer On-Premises
- Automates suspicious file submission from standard ICAP clients including web, email, and cloud gateways
- Improves targeted attack detection through Golden Image management and parallel sample detonation
The increasing instances of data breaches and cyber-attacks on critical business infrastructure are driving European organizations to invest more in cybersecurity solutions and focus more on network security, according to a new report.
The holiday season is kicking into full gear, and so is the annual holiday cybercrime surge. As gift givers scour the web to seek out the best deals, cybercrooks put in extra work to profit off of the holiday shopping frenzy.
As Business Insider reports, Palo Alto Networks has suffered a data breach.
While most individual security analysts today are still overworked and battling burnout, the good news is that the process and organizational support they need is improving across the industry. A new report out last week shows that security programs are growing more mature and performing better as the number of organizations with formal security operations centers (SOC) experiences a huge spike.
Ransomware operators don’t discriminate between targets, hitting everything from industrial control systems and government agencies to small businesses and regular people sitting at home watching YouTube. Depending on the target, the damage can range from mere nuisance to catastrophe.
It turns out, if recent research is any indication, when one company is breached in a vertical market other companies in that vertical market become less attractive places for investors to stick their capital. Yet, when companies share their cybersecurity risk management they significantly outperform their peers that don’t disclose their cybersecurity efforts.