Luna and Black Basta — new ransomware for Windows, Linux and ESXi

This report discusses new ransomware, that targets Windows, Linux and ESXi systems: Luna written in Rust and Black Basta. Continue reading Luna and Black Basta — new ransomware for Windows, Linux and ESXi

Data warehouse services: What to consider before choosing a vendor

The data warehouse is used as a single source of truth for an organization’s data. But before you choose a data warehouse vendor, there are some things to consider, including your business needs.
The post Data warehouse services: What to consider befor… Continue reading Data warehouse services: What to consider before choosing a vendor

What You Need to Know About Data Encryption Right Now

You might feel like you’ve heard these imperatives a million times: “You need to encrypt your data.” “Your information isn’t secure unless you encrypt it.” “You need to eat your fruits and vegetables.” But if you’re like a lot of people, you roll your eyes because you have the good intention of taking care of […]

The post What You Need to Know About Data Encryption Right Now appeared first on Security Intelligence.

Continue reading What You Need to Know About Data Encryption Right Now

Data Protection: What Needs to Be Protected?

Where is your organization’s data? From global data centers to PCs to mobile apps, data is strewn all over the place. So how do you protect it all?  You can’t encrypt everything, right? It’s too expensive and time-consuming. Even the most stringent regulations don’t demand that level of data protection. For example, GDPR focuses primarily […]

The post Data Protection: What Needs to Be Protected? appeared first on Security Intelligence.

Continue reading Data Protection: What Needs to Be Protected?

Data Security Along Every Stage of the Journey

Let’s say you’re planning a train robbery in the Old West. Your posse can jump on board at the station, on the route or at the last stop. The same is true of today’s data robbers. There are three main states in which data exists across an enterprise: at rest, in motion and in use. As […]

The post Data Security Along Every Stage of the Journey appeared first on Security Intelligence.

Continue reading Data Security Along Every Stage of the Journey

Cloud Security: Why Being Intentional in Encryption Matters

Cloud security and web application security demand technology and practices that protect applications and data hosted remotely. Good old-fashioned data encryption is chief among these. The reasons for encrypting cloud data, of course, are privacy, security and regulatory compliance — all standard for any successful enterprise. At the bottom of all this is the idea […]

The post Cloud Security: Why Being Intentional in Encryption Matters appeared first on Security Intelligence.

Continue reading Cloud Security: Why Being Intentional in Encryption Matters

Evolution of JSWorm ransomware

There are times when a single ransomware family has evolved from a mass-scale operation to a highly targeted threat – all in the span of two years. In this post we want to talk about one of those families, named JSWorm. Continue reading Evolution of JSWorm ransomware

Evolution of JSWorm ransomware

There are times when a single ransomware family has evolved from a mass-scale operation to a highly targeted threat – all in the span of two years. In this post we want to talk about one of those families, named JSWorm. Continue reading Evolution of JSWorm ransomware