Cloud Services Under Attack: Closing the Virtual Open Doors to Cyber Crime (Check Point)
Tightening cloud security isn’t just about having the right products and services in place, it’s also about nurturing a security-first mentality within an organization as a whole.
What Is a Botnet? Definition and Prevention (Varonis)
Botnets can be used in other ways and have been known to be leveraged by criminal hacker groups to steal data and further compromise other organizations, and also infect other devices, turning them into “zombie” devices that can be part of the botnet.
Gotham Technology Group is pleased to announce that we have been named to CRN’s 2022 Tech Elite 250. Congratulations to all who made the list as well.
Biden warns business leaders to prepare for Russian cyber attacks
The President told business leaders the national interest is at stake, suggesting that it's "a patriotic obligation that you invest as much as you can in making sure -- and we will help in any way -- that you have built up your technological capacity to deal with cyber attacks."
Secure, Simplify, Innovate: Charting a Path to Adaptive Apps (F5)
Two years into the pandemic, it’s clear that we’ve reached a new baseline in the pace of digital adoption and transformation. Organizations of all types, sizes, and geographies increasingly view innovations in the customer and employee experience as necessary for survival.
A Brief History of The Evolution of Malware (Fortinet)
In recognition of over 50 years since the first computer virus was discovered, we have decided to provide a brief historical insight into the history of computer malware from the pre-internet era to the current world of botnets, ransomware, viruses, worms, and more.
Browser-in-the-Browser Attack Makes Phishing Nearly Invisible
Can we trust web browsers to protect us, even if they say “https?” Not with the novel BitB attack, which fakes popup SSO windows to phish away credentials for Google, Facebook and Microsoft, et al.
Priority Load Balancing: High availability simplified (Citrix)
Citrix ADC’s Priority LB feature simplifies the creation of redundancy for app deployments and reduces the number of configuration API calls required to implement and manage the deployments.
Ransomware is scary, but another scam is costing victims much, much more, says FBI
Business email compromise (BEC) remains the biggest source of financial losses, which totaled $2.4 billion in 2021, up from an estimated $1.8 billion in 2020, according to the Federal Bureau of Investigation's (FBI) Internet Crime Center (IC3).
Balancing Information Protection with Employee Productivity and Privacy (Proofpoint)
Digital transformation can put a modern enterprise at a crossroads: Should the organization take a strict or flexible approach to information protection?
Tax-Season Scammers Spoof Fintechs, Including Stash, Public
Threat actors are impersonating such wildly popular personal-finance apps (which are used more than social media or streaming services) to try to fool people into giving up their credentials.