A week in security (March 2 – 8)

Credit to Author: Malwarebytes Labs| Date: Mon, 09 Mar 2020 20:07:46 +0000

A roundup of the previous week’s security headlines, including the introduction of a new series on child identity theft, an examination of law enforcement’s cybersecurity woes, a progress check on our stalkerware initiative, and more coronavirus scammers on the prowl.

Categories:

Tags:

(Read more…)

The post A week in security (March 2 – 8) appeared first on Malwarebytes Labs.

Read more

Hackers Expand Their Repertoire as Trend Micro Blocks 52 Billion Threats in 2019

Credit to Author: Trend Micro| Date: Tue, 25 Feb 2020 15:56:29 +0000

Variety is welcome in most walks of life, but not when it comes to the threat landscape. Yet that is unfortunately the reality facing modern cybersecurity professionals. As Trend Micro’s 2019  roundup report reveals, hackers have an unprecedented array of tools, techniques and procedures at their disposal today. With 52 billion unique threats detected by…

The post Hackers Expand Their Repertoire as Trend Micro Blocks 52 Billion Threats in 2019 appeared first on .

Read more

Securing the MSP: why they’re their own worst enemy

Credit to Author: William Tsing| Date: Thu, 30 Jan 2020 16:00:00 +0000

Behind each cyberattack on the MSP is typically a system left unpatched, asset management undone, security officer not hired, or board who sees investment in security as a cost center rather than a long-term investment.

Categories:

Tags:

(Read more…)

The post Securing the MSP: why they’re their own worst enemy appeared first on Malwarebytes Labs.

Read more

Changing the Monolith—Part 4: Quick tech wins for a cloud-first world

Credit to Author: Todd VanderArk| Date: Thu, 13 Feb 2020 18:00:25 +0000

Transformation is a daunting task. In this series, I explore how change is possible when addressing the components of people and technology that make up an organization.

The post Changing the Monolith—Part 4: Quick tech wins for a cloud-first world appeared first on Microsoft Security.

Read more