Securing Office 365: Getting Started on Security
Tactical steps customers can take to proactively protect their organizations from attack Continue reading Securing Office 365: Getting Started on Security
Collaborate Disseminate
Tactical steps customers can take to proactively protect their organizations from attack Continue reading Securing Office 365: Getting Started on Security
Here’s what organizations need to know to reduce threats targeting the world’s most ubiquitous SaaS app Continue reading Securing Office 365: Keeping a Step Ahead on SaaS Security
Q&A with Insight’s Richard Diver about what organizations ought to do get everything battened down properly Continue reading Securing Office 365: Get Your Security Right in any Move to the Cloud
ESG’s Mark Bowker: In a multi-vendor cloud setting, the proliferation of SaaS apps such as Office 365 puts new onus on IT Continue reading Securing Office 365 – New Challenges for IT
BlackHat presentation uncovers evidence of irregularities in WinVote machines used in Virginia for state, national elections Continue reading Someone Got into These Voting Machines. But Who?
Researchers say it’s easier than ever to acquire the malware to wage a destructive attack Continue reading After Triton, Will the Industrial Threat Landscape Ever be the Same?
From Black Hat 2018: Unlike the popular narrative that the Mafia is not only getting involved in cyber crime, but taking a leading role in the enterprise, the truth is a lot more complicated Continue reading Is the Mafia Taking Over Cyber Crime? Not Really
At BlackHat Conference, researchers uncover new security flaws plaguing some of the devices winding up in use today by Smart Cities Continue reading Smart City in Practice: Not an Automatic “A”
BlackHat presentation uncovers evidence of irregularities in WinVote machines used in Virginia for state, national elections Continue reading Someone Got into These Voting Machines. But Who?
BlackHat 2018 presentation reveals how easy it was for Israeli undergrads to find a way to use voice commands to take over a locked Windows device Continue reading Hey Cortana, I Just Hacked You With My Voice