Explained: the strengths and weaknesses of the Zero Trust model

Credit to Author: Pieter Arntz| Date: Tue, 28 Jan 2020 16:00:00 +0000

Zero Trust is an information security framework that insists its users “never trust, always verify.” Is this the best security model for organizations today? We examine its strengths and weaknesses.

Categories:

Tags:

(Read more…)

The post Explained: the strengths and weaknesses of the Zero Trust model appeared first on Malwarebytes Labs.

Read more

Report: Organizations remain vulnerable to increasing insider threats

Credit to Author: Jovi Umawing| Date: Thu, 05 Dec 2019 16:00:00 +0000

The risk and challenges insider threats pose to organizations are ever present, even before tech as we know it existed. The age of digitization only made it higher and far-reaching. How has insider threats evolved over time? Where are we now in terms of mitigating insider threat risk? Are businesses really doing something about it? We answer such questions—and more—in this post.

Categories:

Tags:

(Read more…)

The post Report: Organizations remain vulnerable to increasing insider threats appeared first on Malwarebytes Labs.

Read more

Compromising vital infrastructure: water management

Credit to Author: Pieter Arntz| Date: Mon, 01 Apr 2019 15:00:00 +0000

Water management is an essential part of our infrastructure. Loss of it can lead to service outages, diseases, and famine. So the cybersecurity should be top notch.

Categories:

Tags:

(Read more…)

The post Compromising vital infrastructure: water management appeared first on Malwarebytes Labs.

Read more

6 security concerns to consider when automating your business

Credit to Author: Kayla Matthews| Date: Fri, 16 Nov 2018 16:00:00 +0000

When considering an automation strategy, business representatives must be aware of any security risks involved. Here are six automating concerns network admins and other IT staff should keep in mind.

Categories:

Tags:

(Read more…)

The post 6 security concerns to consider when automating your business appeared first on Malwarebytes Labs.

Read more

Workplace violence: the forgotten insider threat

Credit to Author: Jovi Umawing| Date: Fri, 12 Oct 2018 16:00:00 +0000

Among insider threats, workplace violence could be considered the most dangerous. And yet, the majority of organizations are not prepared. What should they do to protect their employees?

Categories:

Tags:

(Read more…)

The post Workplace violence: the forgotten insider threat appeared first on Malwarebytes Labs.

Read more

The enemy is us: a look at insider threats

Credit to Author: Jovi Umawing| Date: Mon, 20 Aug 2018 16:42:50 +0000

It could be the engineer in the IT department, the janitor mopping the lobby, one of the many managers two floors up, or the contractor who’s been in and out the office for weeks now. Or, maybe it could be you. It could be the engineer in the IT department, the janitor mopping the lobby, one of the many managers two floors up, or the contractor who’s been in and out the office for weeks now. Or, maybe it could be you. Who are the insider threats to organizations? And how can they be stopped?

Categories:

Tags:

(Read more…)

The post The enemy is us: a look at insider threats appeared first on Malwarebytes Labs.

Read more

A week in security (November 27 – December 03)

Credit to Author: Malwarebytes Labs| Date: Mon, 04 Dec 2017 18:30:33 +0000

A compilation of notable security news and blog posts from Monday, November 27 to Sunday, December 3, including smart toys, another security breach, ransomware, and things to ponder when shopping for gifts this Christmas season.

Categories:

Tags:

(Read more…)

The post A week in security (November 27 – December 03) appeared first on Malwarebytes Labs.

Read more

A week in security (August 28 – September 3)

Credit to Author: Malwarebytes Labs| Date: Mon, 04 Sep 2017 17:00:53 +0000

Last week, we looked at what actions Kronos can perform in the final installment of a 2-part post. We also dived into Locky, again, a ransomware that just made a comeback, and found that its latest variant (as of this writing) has anti-sandboxing capabilities. This means that once Locky has determined that it’s residing in…

Categories:

Tags:

(Read more…)

The post A week in security (August 28 – September 3) appeared first on Malwarebytes Labs.

Read more