CEO's poor password security allegedly enabled hackers to steal 1,492 in Ether coin only weeks before Enigma Catalyst’s initial coin offering.
Your weekly update of everything security!
The OAuth open authorization framework allows websites and services to share assets among users. It is widely accepted, but be aware of its vulnerabilities.
A strong upward trend in malware developers using steganography for different purposes is seen, including for concealing C&C communication and for downloading malicious modules
Hidden motivations in separate but similar destructive events
How to gain visibility and control of data in cloud apps.
Microsoft Intune gives you a diverse set of tools for managing your complex mobile environment. Intune’s innovative combination of mobile application management and device management options gives you flexibility in how you manage and secure mobile productivity.
The adoption of mobility and cloud services has changed the way business users interact with their devices, apps, and corporate data, increasing the options for users to connect and be productive at any time.
Keep your business soaring with identity and access assurance
This analyst report explores the response organizations must marshal to stand up to the threat of industrialized cybercrime.
While the (cyber-)world was still shaking under the destructive ExPetr/Petya attack that hit on June 27, another ransomware attack targeting Ukraine at the same time went almost unnoticed.
Microsoft Intune service update will be rolled out globally with significant new capabilities
Kunal Pande, partner – IT advisory of KPMG illustrates how risks in the new age of robotics and AI need to be mitigated by enterprises.
Propelled by the need to provide a holistic, identity-driven protection, Microsoft’s Enterprise Mobility & Security solutions (EM&S) stitches in intuitive security on a future-ready platform. What takes the cake though, is that it ensures productivity without compromising on user privilege.
Biometrics can have many more applications beyond gaining entrance to a building.
For security departments, adoption of containerization presents a multifaceted challenge.
The technologies to prevent credential theft and abuse, complement the protections used to stop other types of threats, and they bring together new preventative capabilities.