The COVID-19 pandemic has shifted the spotlight back on security issues that organizations have struggled with for years. Workers are connecting to corporate networks from more devices than ever before – but moves to protect, manage and back up the se… Continue reading Four Steps to Protect Strategic Information
As enterprises rushed to digitize their business processes in response to the COVID-19 pandemic, many businesses — if not most— rapidly pushed forward, only to ask application security questions later. According to a survey released last week, conduct… Continue reading App Security Takes a Back Seat in the Drive to Digital Transformation
New Year’s ransomware news came early this year, when various media platforms began reporting the discovery of Babuk Locker, the newest ransomware variant to target corporations by encrypting files across network-connected devices and extorting ranso… Continue reading Babuk Locker: Mediocre, But Gets the Job Done
Identity 2.0 vendors are about to face a reckoning. For too long, they’ve focused solely on compliance and missed the mark on the adaptability, automation and integration that modern enterprises require. They’ve also emphasized provisioning at a time w… Continue reading Marry IGA with ITSM to avoid the pitfalls of Identity 2.0
The emergence of the everywhere enterprise has shifted CISO priorities away from combating network security threats and towards mitigating mobile security risks, Ivanti reveals. 87% CISOs surveyed agreed that mobile devices have become the focal point … Continue reading CISOs increasingly focus on mitigating mobile security risks
Infoblox unveils research into the foundational infrastructure challenges faced by networking and security decision-makers in the US government. The report reveals a disruptive year of workforce transformation forced by the COVID-19 shutdowns during wh… Continue reading Most network outages exceed $1 million in damages
Each week Breach Clarity compiles a list of what it considers to be notable data breaches—those that are worth highlighting because of the increased intensity of the risk to personal information. The Breach Clarity score identifies the level of risk o… Continue reading Breach Clarity Data Breach Report: Week of Jan. 26
A man in his 30s admits to voyeurism via ADT security cams. Telesforo Aviles did it more then 9,600 times over four and a half years.
The post ADT Installer Hacks Home Cams for Sexual Thrills appeared first on Security Boulevard.
Continue reading ADT Installer Hacks Home Cams for Sexual Thrills
Law enforcement and judicial authorities worldwide have effected a global takedown of the Emotet botnet, Europol announced today. “The Emotet infrastructure essentially acted as a primary door opener for computer systems on a global scale. Once t… Continue reading International law enforcement effort pulls off Emotet botnet takedown
Ransomware attacks are well-documented as a legitimate threat, but haven’t often been taken seriously until recently. Preventing a problem that may or may not happen wasn’t seen as a worthy IT or security investment, due to cost and blind faith … Continue reading Why Enterprises Must Take Ransomware Attacks Seriously