Treasury Dept. Advisory Shines Spotlight on Ransomware Negotiators With attacks showing no signs of abating, some companies have begun offering services to help reduce ransom demands, buy more time, and arrange payments.
Intel's Ice Lake Beefs Up CPU Security for Cloud Workloads The third-generation Xeon processors build in hardware security features to provide extra protection to data in transit, at rest, and in use.
Security Firms & Financial Group Team Up to Take Down Trickbot Microsoft and security firms ESET, Black Lotus Labs, and Symantec collaborated with the financial services industry to cut off the ransomware operation's C2 infrastructure.
Latest Version of MalLocker Android Ransomware Packs New Tricks Like most such mobile malware, the new one doesn't encrypt data but attempts to make an infected system impossible to use, Microsoft says.
NIST Quantum Cryptography Program Nears Completion The National Institute of Standards and Technology's first post-quantum cryptography standard will address key issues, approaches, an arms race, and the technology's uncertain future.
Assuring Business Continuity by Reducing Malware Dwell Time Here's how CISOs and IT security operations teams can best address key challenges to network monitoring that could increase malware dwell time.