'GhostToken' Opens Google Accounts to Permanent Infection A bug in how Google Cloud Platform handles OAuth tokens opened the door to Trojan apps that could access anything in users' personal or business Google Drives, Photos, Gmail, and more.
Shadow IT, SaaS Pose Security Liability for Enterprises Software written or acquired outside of IT's purview is software that IT can't evaluate for security or compliance.
LATEST FROM DR TECHNOLOGY
Intel Prioritizes Security in Latest vPro Chips While Intel is building more hardware protections directly into the chips, enterprises still need a strategy for applying security updates on these components.