Distributed but Connected: Enabling today’s remote digital workforce (Citrix)
As restrictions continue to ease, businesses can take a step back, work out their strategy, select the right partners, and ensure they are doing remote working in a way that empowers their employees to do their best work and that will be sustainable over the long term.
FBI warns of new DDoS attack vectors: CoAP, WS-DD, ARMS, and Jenkins
The purpose of the alert is to warn US companies about the imminent danger, so they can invest in DDoS mitigation systems and create partnerships with their internet service providers to quickly respond to any attacks leveraging these new vectors.
Microsoft Sees Cloud Shift Accelerating, ‘Slowdown’ In On-Prem Licensing
Revenue for Office Commercial products fell 34 percent during the quarter compared to the same period a year earlier. That drop reflected a “continued customer shift to cloud offerings from multi-year on-premises agreements,” along with “a slowdown in transactional licensing, primarily in small and medium businesses,” Microsoft said.
Six Hundred Million Reasons to Celebrate: No More Ransom Turns FOUR!! (McAfee)
Powered by the contributions of its 163 partners the portal, which is available in 36 languages, has added 28 tools in the past year and can now decrypt 140 different types of ransomware infection. To think, just four years ago we started with only a handful of decryptors and partners. That speaks volumes to the commitment by all members to collaborate and work together to give victims a third option; #DontPay.
The Blurring Line Between Privileged and Non-Privileged Users (CyberArk)
There is a growing need to have controls in place to secure all identities – human and non-human – that have the potential to gain privileged access to critical systems and assets. It’s important to consider that this heightened level of access is exactly what attackers seek in their mission to disrupt a business or steal sensitive information.
Multiple Clouds? Multiple Risks. (F5 Networks)
Choosing a standard set of security services that operate in every environment you need them to operate in will go a long way toward eliminating misconfigurations. By focusing on a single set of security services, skills gained are retained across cloud properties.
Themes and Lessons Learned from COVID-19 Cyberattacks (Fortinet)
The email threats have largely been conducted with the intent of delivering malware to a system. Ransomware has also seen an uptick, with most targeted at critical infrastructures. Bad actors using ransomware know a company is more likely to pay the ransom when the critical infrastructure their business relies on is affected.
Ransomware is now your biggest online security nightmare. And it's about to get worse
Ransomware was once a menace mainly for consumers, but now it's a significant threat to business. Just last week, there were warnings about a new wave of ransomware attacks against at least 31 large organisations with the aim of demanding millions of dollars in ransom
Takeaways From 2020 Cyber Security Snapshot (Arctic Wolf)
In the midst of such unique and uncertain times, Cyber Security Hub has provided an in-depth look at the first half of the year by releasing a survey composed of qualified respondents from relevant industries. The results paint a picture of a world attempting to adapt to a rapidly evolving threat landscape.
5 Ways to Ensure Success When Migrating to a Cloud-Based Secure Web Gateway (Forcepoint)
The flexibility that cloud-based SWG solutions offer organizations continues to drive interest. In a recent report, Gartner examined how organizations can make this migration successfully.