The day's top cybersecurity news and in-depth coverage
February 09, 2022
Egress filtering, conditional access rules, and free tools from governments can help identify suspicious activity and protect credentials. Read more â¶
Emotet, described as among the most dangerous types of malware for financial services organizations, has returned.
Virtual Machine Threat Detection at first will target cryptominers running on virtual servers. Detecting ransomware, Trojans, and other malware is coming.
The flaw could allow attackers to gain access to files, environment settings and secret tokens from the central repository server.
With the complexity and criticality of security in the aviation industry, Wheeler warns against viewing security as a competitive advantage. Instead, she says, a more collaborative approach is required.
With organizations using as many as 100 security tools, getting them to work well together is an ongoing battle. These are the most common pitfalls of security tool integration.
For CISOs experiencing burnout, the impact goes beyond not bringing their A game to work; it puts their organizations at increased risk.
Alternatives to backdoors in end-to-end encryption exist, but not all address privacy and security concerns, say experts at last weekâs Engima conference.