Microsoft Says Iranian Hackers Tried To Hack A US Presidential Campaign

Microsoft Says Iranian Hackers Tried To Hack A US Presidential Campaign

Hackers backed by the Iranian government recently tried to hack email accounts used by the campaign of a US presidential candidate, a Microsoft official said…

View More Microsoft Says Iranian Hackers Tried To Hack A US Presidential Campaign
Attention Facebook Users: Here’s What You Need to Know About the Recent Breach

Attention Facebook Users: Here’s What You Need to Know About the Recent Breach

With over 2.4 billion monthly active users, Facebook is the biggest social network worldwide. And with so many users come tons of data, including some…

View More Attention Facebook Users: Here’s What You Need to Know About the Recent Breach
Destructive Malware Goes Mainstream as Attacks Soar 200%

Destructive Malware Goes Mainstream as Attacks Soar 200%

The volume of destructive malware attacks has risen by 200% year-on-year in the first half of 2019, according to new data from IBM X-Force. Once…

View More Destructive Malware Goes Mainstream as Attacks Soar 200%
What Do You Do When A Meteor Hits The Building?

What Do You Do When A Meteor Hits The Building?

Over the years I have had the benefit of working as a security practitioner in numerous corporate environments, not as a consultant but as a…

View More What Do You Do When A Meteor Hits The Building?
Companies with zero-trust network security move toward biometric authentication

Companies with zero-trust network security move toward biometric authentication

Many organizations are moving away from using the network perimeter as a trust indicator when building and enforcing access policies for apps and other IT…

View More Companies with zero-trust network security move toward biometric authentication
Assume breach is for losers: These steps will stop data breaches

Assume breach is for losers: These steps will stop data breaches

“Assume breach” is the popular computer defense strategy based on the idea that your company is either already breached or could easily be breached by…

View More Assume breach is for losers: These steps will stop data breaches