Bitglass Security Spotlight: Ransomware Developments, Additional SolarWinds Victims, and More Data Breaches

Here are the top security stories from recent weeks: 

Kaseya Obtains Master Decryption Key for REvil Ransomware
DarkSide Ransomware Gang Rebrands as BlackMatter
DOJ Says Email Accounts of 27 U.S. Attorneys’ Offices Were Breached During SolarWinds Ha… Continue reading Bitglass Security Spotlight: Ransomware Developments, Additional SolarWinds Victims, and More Data Breaches

Health Care Security Must Mature With 5G

It’s clear that 5G technology is rapidly coming of age, and is enjoying wide adoption across every industry. According to Gartner, the market for 5G infrastructure was predicted to hit $4.2 billion over the past year, with two-thirds of companies depl… Continue reading Health Care Security Must Mature With 5G

How to build a zero-trust cloud data architecture

Cloud computing has had a profound impact on CISOs. They realize its cheap storage, immense scalability, resource elasticity and accessibility from anywhere in the world, at any time, has created a competitive advantage for the companies whose data the… Continue reading How to build a zero-trust cloud data architecture

What Are the Key Challenges Facing IT and OT?

The events of 2020 accelerated many organizations’ efforts to converge their information technology (IT) and operational technology (OT) environments. Now that they’re immersed in this journey, some organizations are finding that it’s not quite as smoo… Continue reading What Are the Key Challenges Facing IT and OT?

Aproveche Device Control Plus para proteger los endpoints Mac y evitar las violaciones de datos a través de los dispositivos periféricos

Con más de 1,4 mil millones de dispositivos en uso, Apple ha adquirido un gran reconocimiento en el sector tecnológico. Cualquiera que esté familiarizado con el ecosistema iOS elogiará la funcionalidad e interoperabilidad de los dispositivos Apple.
Da… Continue reading Aproveche Device Control Plus para proteger los endpoints Mac y evitar las violaciones de datos a través de los dispositivos periféricos

Is Your VPN Tracking (and Leaking) User Activity?

The VPN industry touts all sorts of privacy protocols and encryption methods that purport to protect users. While this is, undoubtedly, important information, and is a decent way to compare and contrast different VPN services, it isn’t the full story … Continue reading Is Your VPN Tracking (and Leaking) User Activity?

Remote work and its lasting impact: What our global research uncovered

The COVID-19 pandemic has not only had a profound impact on everyone across the globe; it has also fundamentally changed the way organizations function. We are nearing one and a half years since remote work became the norm and organizations …
The post … Continue reading Remote work and its lasting impact: What our global research uncovered

Italian Vaccine Sites Shut Down by Ransomware Thugs

Some Italian healthcare websites and their backroom systems have been wiped off the internet by malware.
The post Italian Vaccine Sites Shut Down by Ransomware Thugs appeared first on Security Boulevard.
Continue reading Italian Vaccine Sites Shut Down by Ransomware Thugs

Why Would Someone Hack My Website?

Website hacking has become very common, regardless of the size, scale, or nature of the organizations. Hackers are stealing 75 records per second and creating 300,000 new pieces of malware.
The post Why Would Someone Hack My Website? appeared first on … Continue reading Why Would Someone Hack My Website?

Developing Best Practices for API Security

APIs are pivotal to the overall success of a digital transformation. They allow developers to work across the digital assets and across multiple systems with ease. More organizations are adopting API initiatives, and are approaching digital transforma… Continue reading Developing Best Practices for API Security