Cloud Workloads: How Does Shared Responsibility Affect Security?

Cloud migration continues at a brisk pace. As many as 94% of enterprises now use the cloud, and data suggests that by the end of 2020, only 27% of workloads will happen on-premises. For everything from data storage to critical applications, the cl… Continue reading Cloud Workloads: How Does Shared Responsibility Affect Security?

Advanced Endpoint Security in the New COVID-19 World

The term “new normal” means different things to different people. For some, the term is synonymous with a return to the office (just with a few tweaks), while others think that co-located teams are gone for good. The reality is probabl… Continue reading Advanced Endpoint Security in the New COVID-19 World

How Emerging Threats Outwit Existing Endpoint Security

In the ongoing war over cybersecurity, endpoints seemed like settled territory. After years of surrounding these vulnerable vectors with defensive technologies and company-wide IT hygiene best practices, it became easy to assume the endpoints were… Continue reading How Emerging Threats Outwit Existing Endpoint Security

Zoom Malware Can Record Meetings; Attack Simulation Shows How

Google, SpaceX, and even NASA, recently banning employee use of Zoom as they shift to work-from-home workforces in response to COVID-19 have shined a spotlight on the widely popular video conferencing tool’s security flaws. While “Zoom… Continue reading Zoom Malware Can Record Meetings; Attack Simulation Shows How

Why Client-Grade Technology Doesn’t Cut It for Cloud Workload Protection

 

We’re in the middle of a shift between on-premises server workloads and cloud workloads. The shift started around 10 years ago and will likely continue for the next two decades. After the past decade of cloud adoption, according to … Continue reading Why Client-Grade Technology Doesn’t Cut It for Cloud Workload Protection

Endpoint Detection and Response Is Not the Next Step

 

Antivirus protection is a baseline cost of doing business for the modern organization. At first, companies and governments only needed signature-based antivirus that tracked known malware. As fileless malware and exploits accelerated,… Continue reading Endpoint Detection and Response Is Not the Next Step

Morphisec Protects You from the New PureLocker Ransomware

Last week, Intezer and IBM X-Force released new research identifying a new form of ransomware, which they named PureLocker. Written in PureBasic and designed to attack servers, this damaging new malware has been described as Malware-as-a-Service i… Continue reading Morphisec Protects You from the New PureLocker Ransomware