Microsoft’s Legal Head: U.S. must Stop Secret Gag Orders

Microsoft president and CLO Brad Smith says secretly subpoenaing data from cloud providers—blocking them from telling customers—must stop.
The post Microsoft’s Legal Head: U.S. must Stop Secret Gag Orders appeared first on Security Boulevard.
Continue reading Microsoft’s Legal Head: U.S. must Stop Secret Gag Orders

Top 8 Ways Attackers Can Own Active Directory

Active Directory (AD) is one of the most valuable targets for cyberattackers because it handles authentication and authorization across all enterprise resources and touches virtually everything on the network. AD is complicated to secure, and today, r… Continue reading Top 8 Ways Attackers Can Own Active Directory

An Inside Look at How Hackers Operate

We’ve all seen shows where a character like The Flash, for instance, needs eyes on a situation to fight the bad guy, and a computer nerd, like Felicity, breaks into Central City’s camera network to help save the day. Movies like WarGames, … Continue reading An Inside Look at How Hackers Operate

How Will Artificial Intelligence and Cybersecurity Be Seen Moving Forward?

Artificial intelligence (AI) in cybersecurity can be a double-edged sword. While AI can effectively mitigate threats and prevent potential cyberattacks, criminals can also exploit the technology to their advantage – putting businesses and customers at … Continue reading How Will Artificial Intelligence and Cybersecurity Be Seen Moving Forward?

The Verizon Data Breach Investigation Report – How do you Use it?

The annual Verizon DBIR (Data Breach Investigation Report) is a great tool full of lots of actionable information. However, at over 100 pages full of detailed information, it can seem a bit like walking into a modern hardware store and wondering w… Continue reading The Verizon Data Breach Investigation Report – How do you Use it?

Rethinking Networking to Derail Ransomware

Despite the best efforts of many organizations, ransomware attacks are still on the rise; perhaps indicating that those “best efforts” are just not good enough. Take, for example, the recent ransomware attack on the Colonial Pipeline, prompting a shut… Continue reading Rethinking Networking to Derail Ransomware

Who, Us? Linux Root Bug Quietly Added 7 Years Ago

A nasty vulnerability in most Linux distributions is raising eyebrows among the penguinistas.
The post Who, Us? Linux Root Bug Quietly Added 7 Years Ago appeared first on Security Boulevard.
Continue reading Who, Us? Linux Root Bug Quietly Added 7 Years Ago

Protecting the New Most Vulnerable Population – The Grandparent Scam

In Part 1 of this series, we introduced the concept that the most vulnerable people on the internet are our senior population. According to the FBI, elder fraud impacts millions of American seniors every year. Figures from the United Kingdom show simil… Continue reading Protecting the New Most Vulnerable Population – The Grandparent Scam