A flaw in ConnectWise Control spurred the company to make life harder for scammers

A vulnerability in popular remote access service/platform ConnectWise Control could have been leveraged by scammers to make compromising targets’ computers easier, Guardio researchers have discovered. By abusing the fully-featured 14-day trial op… Continue reading A flaw in ConnectWise Control spurred the company to make life harder for scammers

Fake subscription invoices lead to corporate data theft and extortion

A threat actor dubbed Luna Moth has been leveraging social engineering and legitimate software to steal sensitive data and extort money from small and medium-size businesses. The group is eschewing the use of ransomware and instead relies on targeted e… Continue reading Fake subscription invoices lead to corporate data theft and extortion

Modern Identity and Access Management Makes a Difference, Especially at a Mega-Scale

As businesses embrace more remote users and a hybrid work model, managing user identity and access is more important than ever. Add authentication for millions of third parties and non-employees, and thousands of applications and IoT devices to the mix and you start to understand how important identity and access management (IAM) is.  What Exactly […]

The post Modern Identity and Access Management Makes a Difference, Especially at a Mega-Scale appeared first on Security Intelligence.

Continue reading Modern Identity and Access Management Makes a Difference, Especially at a Mega-Scale

Remote Work Makes it More Important Than Ever to Trust Zero Trust

The remote work era makes the zero trust model critical for most businesses. The time has come to use it. But first, let’s understand what it really is and why the hybrid and remote work trend makes it all but mandatory.  What Is Zero Trust? Zero trust is not a product or a service, but […]

The post Remote Work Makes it More Important Than Ever to Trust Zero Trust appeared first on Security Intelligence.

Continue reading Remote Work Makes it More Important Than Ever to Trust Zero Trust

Starting at Home: Cybersecurity in the Hybrid Workplace

As people settle into the late stages of the pandemic, the hybrid workplace is not going anywhere. Therefore, the enterprise must address the increasing number of entry points into the network as more employees work remotely.  In 2021, 61% of malware directed at organizations targeted remote employees via cloud apps. Since the onset of the pandemic, […]

The post Starting at Home: Cybersecurity in the Hybrid Workplace appeared first on Security Intelligence.

Continue reading Starting at Home: Cybersecurity in the Hybrid Workplace

Organizations taking nearly two months to remediate critical risk vulnerabilities

Edgescan announces the findings of a report which offers a comprehensive view of the state of vulnerability management globally. This year’s report takes a more granular look at the trends by industry, and provides details on which of the known, … Continue reading Organizations taking nearly two months to remediate critical risk vulnerabilities

The importance of securing machine-to-machine and human-to-machine interaction

In this interview with Help Net Security, Oded Hareven, CEO at Akeyless, explains how organizations manage secrets, particularly how this practice has changed and evolved amid the rapid shift to hybrid/remote work and how it benefits organizations secu… Continue reading The importance of securing machine-to-machine and human-to-machine interaction