As a part of our Kaspersky APT Intelligence Reporting subscription, customers received an update in mid-February 2017 on some interesting APT activity that we called WhiteBear. It is a parallel project or second stage of the Skipper Turla cluster of activity documented in another private report. Like previous Turla activity, WhiteBear leverages compromised websites and hijacked satellite connections for command and control (C2) infrastructure.
Organizations should treat security as the business and not as a compliance, says Saravanan Narayanasamy, CEO, GlobeSecure Technologies.
With most organizations adopting mobile and implementing BYOD policies, how will the entry of the device and free WiFi-loving millennial employee affect security of critical data?
C-suite need to be CISOs first as security needs to be an overlay function to every part of the business says John Shier, Senior Security Expert at Sophos.
The threat from ransomware continues to grow. Between April 2016 and March 2017, we blocked ransomware on the computers of 2,581,026 Kaspersky Lab customers. In May, we saw the biggest ransomware epidemic in history, called WannaCry.
Your weekly update of everything security!
The OAuth open authorization framework allows websites and services to share assets among users. It is widely accepted, but be aware of its vulnerabilities.
A strong upward trend in malware developers using steganography for different purposes is seen, including for concealing C&C communication and for downloading malicious modules
Hidden motivations in separate but similar destructive events
How to gain visibility and control of data in cloud apps.
Microsoft Intune gives you a diverse set of tools for managing your complex mobile environment. Intune’s innovative combination of mobile application management and device management options gives you flexibility in how you manage and secure mobile productivity.
The adoption of mobility and cloud services has changed the way business users interact with their devices, apps, and corporate data, increasing the options for users to connect and be productive at any time.
Keep your business soaring with identity and access assurance
This analyst report explores the response organizations must marshal to stand up to the threat of industrialized cybercrime.
While the (cyber-)world was still shaking under the destructive ExPetr/Petya attack that hit on June 27, another ransomware attack targeting Ukraine at the same time went almost unnoticed.
Microsoft Intune service update will be rolled out globally with significant new capabilities
Kunal Pande, partner – IT advisory of KPMG illustrates how risks in the new age of robotics and AI need to be mitigated by enterprises.
Propelled by the need to provide a holistic, identity-driven protection, Microsoft’s Enterprise Mobility & Security solutions (EM&S) stitches in intuitive security on a future-ready platform. What takes the cake though, is that it ensures productivity without compromising on user privilege.