Tycoon Ransomware Banks on Unusual Image File Tactic
While initial information shows a very targeted attack, it illustrates the notion that criminal groups are seeking new ways to avoid detection once inside an organization.
Security Without Barriers, Part Two: Planning for Cyber Resilience (FireEye)
For many organizations, recent world events have accelerated their adoption of cloud computing and increased their reliance on remote workers. This shift continues a trend where the traditional network perimeter has largely disappeared.
CallStranger vulnerability lets attacks bypass security systems and scan LANs
CallStranger allows attackers to hijack smart devices for distributed denial of service (DDoS) attacks, but also for attacks that bypass security solutions to reach and conduct scans on a victim's internal network -- effectively granting attackers access to areas where they normally wouldn't be able to reach.
What’s new with Citrix Workspace app 2006.1 for Windows
In addition to fixing a few experience issues and squashing bugs, this new release enhances the power of Citrix Analytics for Security and brings additional capabilities to our optimization for Microsoft Teams.
Phishing: Why remote working is making it harder for you to spot phoney emails
In an office, it would be relatively simple to check if a colleague had sent a request for a business bank transfer by walking over and asking if they'd sent the message – but with people suddenly working from home, making those checks isn't so simple.
Evolution of Enterprise Applications and Performance (Turbonomic)
The use of DevOps processes, containers, and microservices in a multicloud world is empowering IT organizations to move fast, scale out, and deliver faster time to market and improved customer relationships.
12 Biggest Cloud Threats And Vulnerabilities In 2020
From misconfigured storage buckets and excess privileges to Infrastructure as Code (IoC) templates and automated attacks, here’s a look at 12 of the biggest cloud threats technical experts are worried about this year.
Performing forensic analyses in VDI environments (Citrix)
On a persistent desktop, you can isolate the machine from the network and treat it in a similar way to a physical machine, having access to the virtual hardware (RAM and hard drives) and software components. But when it comes to a non-persistent desktop, not all data will be available all the time. In fact, there is a lot of information that will be lost after the user logs out and/or the machine is restarted.
Infrastructure as a Service (IaaS) as a Stepping Stone to Hybrid Multicloud (NetApp)
Given that infrastructure is tied to application ownership in our configuration management database (CMDB), we were able to expand the IaaS user community beyond superusers to include primary application support personnel. These users are now able to register their applications directly into the CMDB.
The Top Three Data Breach Vectors and How to Combat Them (Proofpoint)
Verizon’s 2020 Data Breach Investigations Report analyzed 32,002 security incidents of which 3,950 were confirmed data breaches. Proofpoint explores the top three vectors identified by this comprehensive analysis and offers some suggestions on how to equip your organization to protect against each.
IoT Security Trends & Challenges in the Wake of COVID-19
The inclusion of such large numbers of IoT devices introduces substantial risks if they are not implemented securely from the start. Here are five recommendations to help security teams head off IoT cybersecurity challenges.
Unified Fast File and Object Demands a Modern Storage Design (Pure Storage)
It’s not enough to simply build a storage platform that can address the needs of modern data and its requirements. A UFFO platform must also account for and deliver the characteristics of modern cloud computing.
May’s Most Wanted Malware: Ursnif Banking Trojan Ranks On Top 10 Malware List for First Time, Over Doubling Its Impact On Organizations (Check Point)
While COVID-19-related attacks have fallen, we have seen a 16% increase in overall cyber-attacks in May compared to March and April, so organizations must remain vigilant by using certain tools and techniques, especially with the mass shift to remote working, which attackers are taking advantage of.
McAfee MVISION Cloud Becomes First Cloud Access Security Broker to Receive U.S. Government’s FedRAMP High JAB P-ATO Designation
The FedRAMP process has certified that chief information officers from the Department of Defense (DoD), the General Services Administration (GSA) and the Department of Homeland Security (DHS) have evaluated and approved MVISION Cloud for their increasingly complex and expanding cloud environments.
The Importance of the End-User Experience During and After COVID-19 (Login VSI)
Whether work from home continues or reverts the world is getting smaller, and the chances that you will need to use a tool like work from home will remain high. So, take a breath (through your mask), assess your end-user experience, and tune-up that work-from-home offering so that your users – and business productivity – does not suffer.
How Palo Alto Networks and Okta Are Helping Enable Secure Remote Work (Palo Alto)
Security is particularly important in a time when attackers are capitalizing on the need for COVID-19 information to launch phishing attacks, lure users to fake websites, capture login credentials, start ransomware attacks or steal data.