Zoom Zoom: 'Dark Power' Ransomware Extorts 10 Targets in Less Than a Month A new threat actor is racking up victims and showing unusual agility. Part of its success could spring from the use of the Nim programming language.
How CISOs Can Reduce the Danger of Using Data Brokers Without proof that it was collected legally, purchased data can threaten an enterprise's security compliance and even expose the company to litigation.
LATEST FROM DR TECHNOLOGY
Drive to Pervasive Encryption Boosts Key Management Key vaults, aka key-management-as-a-service (KMaaS), promise to allow companies to encrypt sensitive data across cloud and third parties with granular control.